


default search action
37th ASE 2022: Rochester, MI, USA
- 37th IEEE/ACM International Conference on Automated Software Engineering, ASE 2022, Rochester, MI, USA, October 10-14, 2022. ACM 2022, ISBN 978-1-4503-9475-8
Research Papers
- Jiwei Yan
, Shixin Zhang
, Yepang Liu
, Xi Deng, Jun Yan, Jian Zhang:
A Comprehensive Evaluation of Android ICC Resolution Techniques. 1:1-1:13 - Hoan Anh Nguyen, Hung Dang Phan, Syeda Khairunnesa Samantha, Son Nguyen, Aashish Yadavally, Shaohua Wang, Hridesh Rajan, Tien N. Nguyen:
A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications. 2:1-2:13 - Jaehyung Lee
, Kisun Han
, Hwanjo Yu
:
A Light Bug Triage Framework for Applying Large Pre-trained Language Model. 3:1-3:11 - Tao Huang
, Pengfei Chen, Jingrun Zhang, Ruipeng Li, Rui Wang:
A Transferable Time Series Forecasting Service Using Deep Transformer Model for Online Systems. 4:1-4:12 - Rongxin Wu, Minglei Chen, Chengpeng Wang
, Gang Fan
, Jiguang Qiu, Charles Zhang:
Accelerating Build Dependency Error Detection via Virtual Build. 5:1-5:12 - Ju Qian
, Yingwei Ma, Chenghao Lin, Lin Chen
:
Accelerating OCR-Based Widget Localization for Test Automation of GUI Applications. 6:1-6:13 - Nesara Dissanayake
, Asangi Jayatilaka
, Mansooreh Zahedi
, Muhammad Ali Babar
:
An Empirical Study of Automation in Software Security Patch Management. 7:1-7:13 - Chengran Yang, Bowen Xu, Ferdian Thung, Yucen Shi, Ting Zhang
, Zhou Yang, Xin Zhou, Jieke Shi
, Junda He, DongGyun Han
, David Lo
:
Answer Summarization for Technical Queries: Benchmark and New Approach. 8:1-8:13 - Cedric Richter
, Jan Haltermann
, Marie-Christine Jakobs
, Felix Pauck
, Stefan Schott
, Heike Wehrheim
:
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? 9:1-9:12 - Yuxi Ling
, Kailong Wang, Guangdong Bai
, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. 10:1-10:12 - José Antonio Hernández López
, Martin Weyssow, Jesús Sánchez Cuadrado
, Houari A. Sahraoui
:
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models. 11:1-11:11 - Tomasz Kuchta
, Bartosz Zator
:
Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems. 12:1-12:12 - Jialu Zhang, De Li, John Charles Kolesar
, Hanyuan Shi, Ruzica Piskac:
Automated Feedback Generation for Competition-Level Code. 13:1-13:13 - Fangwen Mu
, Xiao Chen, Lin Shi
, Song Wang, Qing Wang:
Automatic Comment Generation via Multi-Pass Deliberation. 14:1-14:12 - Finlay Macklon
, Mohammad Reza Taesiri, Markos Viggiato, Stefan Antoszko, Natalia Romanova, Dale Paas, Cor-Paul Bezemer
:
Automatically Detecting Visual Bugs in HTML5 Canvas Games. 15:1-15:11 - Hamed Barzamini
, Mona Rahimi:
B-AIS: An Automated Process for Black-box Evaluation of Visual Perception in AI-enabled Software against Domain Semantics. 16:1-16:13 - Xiaoyuan Xie
, Pengbo Yin
, Songqiang Chen
:
Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided Method. 17:1-17:13 - Chen Zhang, Bihuan Chen, Junhao Hu, Xin Peng, Wenyun Zhao:
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration Builds. 18:1-18:13 - Arianna Blasi
, Alessandra Gorla
, Michael D. Ernst
, Mauro Pezzè
:
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints. 19:1-19:11 - Vikram Nitin, Shubhi Asthana, Baishakhi Ray
, Rahul Krishna
:
CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture. 20:1-20:12 - Weilin Luo
, Hai Wan
, Delong Zhang, Jianfeng Du
, Hengdi Su:
Checking LTL Satisfiability via End-to-end Learning. 21:1-21:13 - Jiyang Zhang
, Sheena Panthaplackel, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
CoditT5: Pretraining for Source Code and Natural Language Editing. 22:1-22:12 - Zhiqiang Zang
, Nathan Wiatrek, Milos Gligoric, August Shi:
Compiler Testing using Template Java Programs. 23:1-23:13 - Jieke Shi
, Zhou Yang, Bowen Xu, Hong Jin Kang, David Lo
:
Compressing Pre-trained Models of Code into 3 MB. 24:1-24:12 - Boqi Chen
, Kristóf Marussy
, Sebastian Pilarski
, Oszkár Semeráth
, Dániel Varró
:
Consistent Scene Graph Generation by Constraint Optimization. 25:1-25:13 - Yanqi Su
, Zheming Han
, Zhenchang Xing
, Xin Xia
, Xiwei Xu
, Liming Zhu
, Qinghua Lu
:
Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing. 26:1-26:13 - Vidush Singhal
, Akul Abhilash Pillai
, Charitha Saumya
, Milind Kulkarni
, Aravind Machiry
:
Cornucopia : A Framework for Feedback Guided Generation of Binaries. 27:1-27:13 - Aryaz Eghbali
, Michael Pradel
:
CrystalBLEU: Precisely and Efficiently Measuring the Similarity of Code. 28:1-28:12 - Mia Mohammad Imran
, Yashasvi Jain, Preetha Chatterjee
, Kostadin Damevski
:
Data Augmentation for Improving Emotion Recognition in Software Engineering Communication. 29:1-29:13 - Chenyang Yang
, Rachel A. Brower-Sinning, Grace A. Lewis
, Christian Kästner
:
Data Leakage in Notebooks: Static Detection and Better Processes. 30:1-30:12 - Simin Chen, Mirazul Haque, Cong Liu, Wei Yang
:
DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks. 31:1-31:13 - Oskar Haarklou Veileborg, Georgian-Vlad Saioc, Anders Møller
:
Detecting Blocking Errors in Go Programs using Localized Abstract Interpretation. 32:1-32:12 - Sheikh Shadab Towqir
, Bowen Shen
, Muhammad Ali Gulzar
, Na Meng
:
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis. 33:1-33:13 - Yueming Wu
, Siyue Feng, Deqing Zou, Hai Jin:
Detecting Semantic Code Clones by Building AST-based Markov Chains Model. 34:1-34:13 - Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song
, Wei Wang, Jun Wei, Dan Ye:
Differentially Testing Database Transactions for Fun and Profit. 35:1-35:12 - Jianzhong Su
, Hong-Ning Dai
, Lingjun Zhao
, Zibin Zheng, Xiapu Luo
:
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing. 36:1-36:12 - Jinsheng Ba
, Gregory J. Duck
, Abhik Roychoudhury
:
Efficient Greybox Fuzzing to Detect Memory Errors. 37:1-37:12 - Yunfan Zhang
, Ruidong Zhu
, Yingfei Xiong
, Tao Xie
:
Efficient Synthesis of Method Call Sequences for Test Generation and Bounded Verification. 38:1-38:12 - Zijing Yin
, Yiwen Xu, Chijin Zhou
, Yu Jiang:
Empirical Study of System Resources Abused by IoT Attackers. 39:1-39:13 - Hao Zhong
:
Enriching Compiler Testing with Real Program from Bug Report. 40:1-40:12 - Yi Song
, Xiaoyuan Xie
, Xihao Zhang
, Quanming Liu
, Ruizhi Gao
:
Evolving Ranking-Based Failure Proximities for Better Clustering in Fault Isolation. 41:1-41:13 - Rishabh Ranjan, Ishita Agrawal, Subodh Sharma
:
Exploiting Epochs and Symmetries in Analysing MPI Programs. 42:1-42:12 - Mauro Bringolf, Dominik Winterer
, Zhendong Su
:
Finding and Understanding Incompleteness Bugs in SMT Solvers. 43:1-43:10 - Ashwin Kallingal Joshy
, Wei Le
:
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures. 44:1-44:12 - Haeun Lee
, Soomin Kim
, Sang Kil Cha
:
Fuzzle: Making a Puzzle for Fuzzers. 45:1-45:12 - Haoxiang Tian, Guoquan Wu
, Jiren Yan, Yan Jiang, Jun Wei, Wei Chen, Shuo Li, Dan Ye:
Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior Patterns. 46:1-46:12 - Nuno Saavedra
, João F. Ferreira
:
GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as Code. 47:1-47:12 - Zilong He, Pengfei Chen, Yu Luo, Qiuyu Yan, Hongyang Chen, Guangba Yu, Fangyuan Li:
Graph based Incident Extraction and Diagnosis in Large-Scale Online Systems. 48:1-48:13 - Jingzhou Fu, Jie Liang, Zhiyong Wu, Mingzhe Wang, Yu Jiang:
Griffin : Grammar-Free DBMS Fuzzing. 49:1-49:12 - Navid Salehnamadi
, Forough Mehralian
, Sam Malek
:
Groundhog: An Automated Accessibility Crawler for Mobile Apps. 50:1-50:12 - Lyuye Zhang
, Chengwei Liu
, Zhengzi Xu
, Sen Chen
, Lingling Fan
, Bihuan Chen
, Yang Liu
:
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing. 51:1-51:12 - An Ran Chen
, Tse-Hsun (Peter) Chen
, Junjie Chen
:
How Useful is Code Change Information for Fault Localization in Continuous Integration? 52:1-52:12 - Yuanping Yu
, Xiangkun Jia
, Yuwei Liu
, Yanhao Wang
, Qian Sang
, Chao Zhang, Purui Su
:
HTFuzz: Heap Operation Sequence Sensitive Fuzzing. 53:1-53:13 - Quentin Le Dilavrec
, Djamel Eddine Khelladi
, Arnaud Blouin
, Jean-Marc Jézéquel
:
HyperAST: Enabling Efficient Analysis of Software Histories at Scale. 54:1-54:12 - Simón Gutiérrez Brida
, Germán Regis
, Guolong Zheng
, Hamid Bagheri
, ThanhVu Nguyen
, Nazareno Aguirre
, Marcelo F. Frias
:
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications. 55:1-55:13 - Chenguang Zhu
, Ye Liu
, Xiuheng Wu
, Yi Li
:
Identifying Solidity Smart Contract API Documentation Errors. 56:1-56:13 - Yu Liu
, Pengyu Nie
, Owolabi Legunsen
, Milos Gligoric:
Inline Tests. 57:1-57:13 - Meiqiu Xu, Ying Wang
, Shing-Chi Cheung
, Hai Yu, Zhiliang Zhu:
Insight: Exploring Cross-Ecosystem Vulnerability Impacts. 58:1-58:13 - Haoye Tian
, Xunzhu Tang, Andrew Habib
, Shangwen Wang, Kui Liu
, Xin Xia, Jacques Klein
, Tegawendé F. Bissyandé
:
Is this Change the Answer to that Problem?: Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. 59:1-59:13 - Miao Chen
, Tengfei Tu
, Hua Zhang
, Qiaoyan Wen
, Weihang Wang
:
Jasmine: A Static Analysis Framework for Spring Core Technologies. 60:1-60:13 - Ibrahim Mesecan
, Daniel Blackwell
, David Clark
, Myra B. Cohen
, Justyna Petke
:
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage. 61:1-61:12 - Yang Sun
, Christopher M. Poskitt
, Jun Sun, Yuqi Chen, Zijiang Yang:
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles. 62:1-62:12 - Junrui Liu
, Yanju Chen
, Bryan Tan
, Isil Dillig
, Yu Feng
:
Learning Contract Invariants Using Reinforcement Learning. 63:1-63:11 - Zhao Tian
, Junjie Chen
, Qihao Zhu
, Junjie Yang
, Lingming Zhang
:
Learning to Construct Better Mutation Faults. 64:1-64:13 - Jingbo Wang
, Chao Wang:
Learning to Synthesize Relational Invariants. 65:1-65:12 - Sofia Reis
, Rui Abreu
, Marcelo d'Amorim
, Daniel Fortunato
:
Leveraging Practitioners' Feedback to Improve a Security Linter. 66:1-66:12 - Juan Manuel Copia
, Pablo Ponzio, Nazareno Aguirre
, Alessandra Gorla, Marcelo F. Frias:
LISSA: Lazy Initialization with Specialized Solver Aid. 67:1-67:12 - Rui Xie
, Tianxiang Hu, Wei Ye, Shikun Zhang
:
Low-Resources Project-Specific Code Summarization. 68:1-68:12 - Liu Wang, Haoyu Wang, Xiapu Luo
, Yulei Sui
:
MalWhiteout: Reducing Label Errors in Android Malware Detection. 69:1-69:13 - Xiaoyu Sun
, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy, Li Li
:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. 70:1-70:13 - Qingchao Shen
, Junjie Chen
, Jie M. Zhang
, Haoyu Wang
, Shuang Liu
, Menghan Tian
:
Natural Test Generation for Precise Testing of Question Answering Software. 71:1-71:12 - Patric Feldmeier
, Gordon Fraser
:
Neuroevolution-Based Generation of Tests and Oracles for Games. 72:1-72:13 - Jasmine Latendresse, Suhaib Mujahid, Diego Elias Costa
, Emad Shihab:
Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM. 73:1-73:12 - Binhang Qi
, Hailong Sun
, Xiang Gao
, Hongyu Zhang
:
Patching Weak Convolutional Neural Network Models through Modularization and Composition. 74:1-74:12 - Xianchang Luo, Yinxing Xue, Zhenchang Xing, Jiamou Sun:
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language Models. 75:1-75:13 - Youkun Shi, Yuan Zhang
, Tianhan Luo, Xiangyu Mao, Min Yang:
Precise (Un)Affected Version Analysis for Web Vulnerabilities. 76:1-76:13 - Tahmid Rafi
, Xueling Zhang
, Xiaoyin Wang
:
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing. 77:1-77:13 - Jie Su
, Cong Tian
, Zuchao Yang
, Jiyu Yang
, Bin Yu
, Zhenhua Duan
:
Prioritized Constraint-Aided Dynamic Partial-Order Reduction. 78:1-78:13 - Qing Huang
, Zhiqiang Yuan
, Zhenchang Xing
, Xiwei Xu, Liming Zhu
, Qinghua Lu
:
Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial Code. 79:1-79:13 - Zhaodi Zhang
, Yiting Wu
, Si Liu
, Jing Liu
, Min Zhang
:
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks. 80:1-80:13 - Zixi Liu, Yang Feng, Yining Yin, Jingyu Sun, Zhenyu Chen
, Baowen Xu:
QATest: A Uniform Fuzzing Framework for Question Answering Systems. 81:1-81:12 - Yedi Zhang, Zhe Zhao, Guangke Chen
, Fu Song, Min Zhang
, Taolue Chen
, Jun Sun:
QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks. 82:1-82:13 - Zhuo Zhang, Yan Lei
, Meng Yan
, Yue Yu, Jiachi Chen, Shangwen Wang, Xiaoguang Mao:
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach. 83:1-83:13 - Alexi Turcotte
, Mark W. Aldrich
, Frank Tip
:
reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications. 84:1-84:12 - Yan Xiao
, Yun Lin, Ivan Beschastnikh
, Changsheng Sun, David S. Rosenblum
, Jin Song Dong:
Repairing Failure-inducing Inputs with Input Reflection. 85:1-85:13 - Zhong Li
, Minxue Pan
, Yu Pei
, Tian Zhang, Linzhang Wang
, Xuandong Li
:
Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering Datasets. 86:1-86:13 - Max Taylor, Johnathon Aurand, Feng Qin, Xiaorui Wang, Brandon Henry, Xiangyu Zhang:
SA4U: Practical Static Analysis for Unit Type Error Detection. 87:1-87:11 - Jie Zhu
, Leye Wang
, Xiao Han
:
Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software Deployment. 88:1-88:13 - David Fernández-Amorós
, Ruben Heradio
, Christoph Mayr-Dorn
, Alexander Egyed
:
Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel. 89:1-89:12 - Fuman Xie
, Yanjun Zhang
, Chuan Yan, Suwan Li, Lei Bu
, Kai Chen, Zi Huang
, Guangdong Bai
:
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. 90:1-90:13 - Zhichao Zhou
, Yuming Zhou, Chunrong Fang
, Zhenyu Chen
, Yutian Tang
:
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test Generation. 91:1-91:12 - He Ye, Matias Martinez, Xiapu Luo
, Tao Zhang
, Martin Monperrus:
SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics. 92:1-92:13 - Chao Wang, Rongxin Wu, Haohao Song, Jiwu Shu, Guoqing Li:
smartPip: A Smart Approach to Resolving Python Dependency Conflict Issues. 93:1-93:12 - Houssem Ben Braiek, Ali Tfaily, Foutse Khomh, Thomas Reid, Ciro Guida:
SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft Design. 94:1-94:13 - Clement Poncelet
, Konstantinos Sagonas
, Nicolas Tsiftes
:
So Many Fuzzers, So Little Time✱: Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)Stack. 95:1-95:12 - Emanuela Guglielmi
, Giovanni Rosa
, Simone Scalabrino
, Gabriele Bavota
, Rocco Oliveto
:
Sorry, I don't Understand: Improving Voice User Interface Testing. 96:1-96:12 - Wenkang Zhong
, Hongliang Ge, Hongfei Ai, Chuanyi Li, Kui Liu
, Jidong Ge, Bin Luo:
StandUp4NPR: Standardizing SetUp for Empirically Comparing Neural Program Repair Systems. 97:1-97:13 - Ke Sun
, Yifan Zhao
, Dan Hao
, Lu Zhang
:
Static Type Recommendation for Python. 98:1-98:13 - Qi Xin, Qirun Zhang
, Alessandro Orso
:
Studying and Understanding the Tradeoffs Between Generality and Reduction in Software Debloating. 99:1-99:13 - Emilio Coppa
, Heng Yin
, Camil Demetrescu
:
SymFusion: Hybrid Instrumentation for Concolic Execution. 100:1-100:12 - Yuhui Su
, Chunyang Chen
, Junjie Wang, Zhe Liu
, Dandan Wang, Shoubin Li, Qing Wang:
The Metamorphosis: Automatic Detection of Scaling Issues for Mobile Apps. 101:1-101:12 - Andrea Stocco
, Paulo J. Nunes
, Marcelo d'Amorim
, Paolo Tonella
:
ThirdEye: Attention Maps for Safe Autonomous Driving Systems. 102:1-102:12 - Forough Mehralian
, Navid Salehnamadi
, Syed Fatiul Huq
, Sam Malek
:
Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps. 103:1-103:13 - Yingyi Zhang, Zan Wang, Jiajun Jiang, Hanmo You, Junjie Chen:
Toward Improving the Robustness of Deep Learning Models via Model Transformation. 104:1-104:13 - Lili Quan
, Qianyu Guo, Xiaofei Xie, Sen Chen
, Xiaohong Li, Yang Liu
:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. 105:1-105:13 - Wei Tang
, Zhengzi Xu
, Chengwei Liu
, Jiahui Wu
, Shouguo Yang, Yi Li
, Ping Luo, Yang Liu
:
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem. 106:1-106:12 - Deheng Yang
, Xiaoguang Mao, Liqian Chen, Xuezheng Xu, Yan Lei, David Lo
, Jiayu He
:
TransplantFix: Graph Differencing-based Code Transplantation for Automated Program Repair. 107:1-107:13 - Xueyang Li
, Shangqing Liu, Ruitao Feng, Guozhu Meng
, Xiaofei Xie
, Kai Chen, Yang Liu
:
TransRepair: Context-aware Program Repair for Compilation Errors. 108:1-108:13 - Yutao Hu, Deqing Zou, Junru Peng, Yueming Wu
, Junjie Shan, Hai Jin:
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection. 109:1-109:12 - Elias Kuiter
, Sebastian Krieter, Chico Sundermann, Thomas Thüm
, Gunter Saake:
Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses. 110:1-110:13 - Yiwen Wu, Yang Zhang, Kele Xu
, Tao Wang, Huaimin Wang:
Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS Projects. 111:1-111:13 - Fahimeh Ebrahimi
, Anas Mahmoud
:
Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews. 112:1-112:12 - Yuanyuan Yuan
, Qi Pang
, Shuai Wang
:
Unveiling Hidden DNN Defects with Decision-Based Metamorphic Testing. 113:1-113:13