


default search action
32nd SANER 2025: Montreal, QC, Canada
- IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Montreal, QC, Canada, March 4-7, 2025. IEEE 2025, ISBN 979-8-3315-3510-0

- Danning Xie, Byoung-Joo Yoo, Nan Jiang, Mijung Kim, Lin Tan, Xiangyu Zhang, Judy S. Lee:

How Effective are Large Language Models in Generating Software Specifications? 1-12 - Yuqi Sha, Feng Jiang, Qiang Hu, Yifan He:

An Ensemble Learning Method Based on Neighborhood Granularity Discrimination Index and Its Application in Software Defect Prediction. 1-12 - Nils Purschke, Sven Kirchner, Alois Knoll:

SpeedGen: Enhancing Code Efficiency through Large Language Model-Based Performance Optimization. 1-12 - Louis Milliken, Sungmin Kang, Shin Yoo:

Beyond pip Install: Evaluating LLM Agents for the Automated Installation of Python Projects. 1-11 - Omar I. Al-Bataineh:

Reduce Before you Repair: Advantages of Combining Program Slicing with Automated Program Repair. 1-6 - Gul Aftab Ahmed, Muslim Chochlov, Abdul Razzaq, James Vincent Patten, Yuanhua Han, Guoxian Lu, Jim Buckley, David Gregg:

Industrial-Scale Neural Network Clone Detection with Disk-Based Similarity Search. 1-11 - Hanan Abdulwahab Siala, Kevin Lano:

Towards Using LLMs in the Reverse Engineering of Software Systems to Object Constraint Language. 1-6 - Zhangqian Bi, Yao Wan, Zhaoyang Chu, Yufei Hu, Junyi Zhang, Hongyu Zhang, Guandong Xu, Hai Jin:

How to Select Pre-Trained Code Models for Reuse? A Learning Perspective. 1-12 - Giordano d'Aloisio, Luca Traini, Federica Sarro, Antinisca Di Marco:

On the Compression of Language Models for Code: An Empirical Study on CodeBERT. 12-23 - Jiaming Zhang, Chang-Ai Sun, Huai Liu

, Sijin Dong:
Can Large Language Models Discover Metamorphic Relations? A Large-Scale Empirical Study. 24-35 - Salimata Sawadogo, Aminata Sabané, Rodrique Kafando, Abdoul Kader Kaboré, Tegawendé F. Bissyandé:

Revisiting the Non-Determinism of Code Generation by the GPT-3.5 Large Language Model. 36-44 - Waleed Abdeen, Michael Unterkalmsteiner, Krzysztof Wnuk, Alessio Ferrari, Panagiota Chatzipetrou:

Language Models to Support Multi-Label Classification of Industrial Data. 45-55 - Joy Krishan Das

, Saikat Mondal, Chanchal K. Roy:
Why Do Developers Engage with ChatGPT in Issue-Tracker? Investigating Usage and Reliance on ChatGPT-Generated Code. 68-79 - Ayberk Yasa, Cemhan Kaan Özaltan, Görkem Ayten, Fatih Kaplama, Ömercan Devran, Baykal Mehmet Uçar, Eray Tüzün:

Evaluating ReLink for Traceability Link Recovery in Practice. 80-90 - Takasaburo Fukuda, Takao Nakagawa, Keisuke Miyazaki, Susumu Tokumoto:

Development of Automated Software Design Document Review Methods Using Large Language Models. 91-101 - Vanshika Singh, Caglar Korlu, Wesley K. G. Assunção:

Experiences on Using Large Language Models to Re-Engineer a Legacy System at Volvo Group. 102-112 - Amina Bouaziz, Mohamed Aymen Saied, Mohammed Sayagh, Ali Ouni, Mohamed Wiem Mkaouer:

An Empirical Study on Microservices Deployment Trends, Topics and Challenges in Stack Overflow. 113-123 - Youwei Huang, Sen Fang, Jianwen Li, Bin Hu, Jiachun Tao, Tao Zhang

:
Deep Smart Contract Intent Detection. 124-135 - Deli Chen, Chunyang Ye, Hui Zhou, Shanyan Lai, Bo Li:

Enhancing Microservice Migration Transformation from Monoliths with Graph Neural Networks. 136-146 - Ye Liu, Yixuan Liu, Yi Li, Cyrille Artho:

Specification Mining for Smart Contracts with Trace Slicing and Predicate Abstraction. 147-158 - Tomás Cerný, Gabriel Goulis, Amr S. Abdelfattah:

Towards Change Impact Analysis in Microservices-based System Evolution. 159-169 - Gabriele De Vito, Damiano D'Amici, Fabiano Izzo, Filomena Ferrucci, Dario Di Nucci:

LLM-Based Generation of Solidity Smart Contracts from System Requirements in Natural Language: The AstraKode Case. 170-180 - Ruben Opdebeeck

, Bram Adams, Coen De Roover
:
Analysing Software Supply Chains of Infrastructure as Code: Extraction of Ansible Plugin Dependencies. 181-192 - Qingao Dong, Yuanzhang Lin

, Hailong Sun, Xiang Gao:
Enhancing Automated Vulnerability Repair Through Dependency Embedding and Pattern Store. 193-204 - Zhang Zhang, Xinjun Mao, Shangwen Wang, Kang Yang, Tanghaoran Zhang, Fei Gao, Xunhui Zhang:

Improving API Knowledge Comprehensibility: A Context-Dependent Entity Detection and Context Completion Approach Using LLM. 205-216 - Dahan Pan

, Yi Xu, Runhan Feng, Donghui Yu
, Jiawen Chen, Ya Fang, Yuanyuan Zhang
:
Pay Your Attention on Lib! Android Third-Party Library Detection via Feature Language Model. 217-228 - Jiaxin Liu, Yating Zhang, Deze Wang, Yiwei Li, Wei Dong:

THINK: Tackling API Hallucinations in LLMs via Injecting Knowledge. 229-240 - Gabriel Darbord

, Nicolas Anquetil
, Benoît Verhaeghe
, Anne Etien
:
A Multi-Language Tool for Generating Unit Tests from Execution Traces. 241-251 - Zhenghao Liu, Li Yuan, Jiexin Wang, Yi Cai:

CSE-WSS: Code Structure Enhancement Framework with Weighted Semantic Similarity for Changeset-Based Bug Localization. 252-263 - Zhixing He, Hao Zhong:

From Bug Reports to Workarounds: The Real-World Impact of Compiler Bugs. 264-275 - Yanru Ding, Yanmei Zhang, Guan Yuan, Shujuan Jiang, Wei Dai, Luciano Baresi:

Optimizing Class Integration Testing with Criticality-Driven Test Order Generation. 276-286 - Ahmed Zaki, Arindam Sharma, Cristian Cadar:

Generating and Contributing Test Cases for C Libraries from Client Code: A Case Study. 287-298 - Dongming Jin, Nianyu Li, Kai Yang, Minghui Zhou, Zhi Jin:

A First Look at Package-to-Group Mechanism: An Empirical Study of the Linux Distributions. 299-309 - Qiaolin Qin, Roozbeh Aghili, Heng Li, Ettore Merlo:

Preprocessing is All You Need: Boosting the Performance of Log Parsers with a General Preprocessing Framework. 310-320 - Ming Zhong

, Fang Lv, Lulin Wang, Lei Qiu, Hongna Geng, Huimin Cui, Xiaobing Feng:
Boosting Large Language Models for System Software Retargeting: A Preliminary Study. 321-326 - Dmytro Borysenkov, Adriano Vogel, Sören Henning, Esteban Pérez-Wohlfeil:

Analyzing Logs of Large-Scale Software Systems Using Time Curves Visualization. 327-337 - Chris Parnin, Gustavo Soares, Rahul Pandita, Sumit Gulwani, Jessica Rich, Austin Z. Henley:

Building Your Own Product Copilot: Challenges, Opportunities, and Needs. 338-348 - Sebastian Schneider, Tomas Sujovolsky, Paolo Arcaini, Fuyuki Ishikawa, Truong Vinh Truong Duy

:
Filter-based Repair of Semantic Segmentation in Safety-Critical Systems. 349-359 - Xuemeng Cai, Lingxiao Jiang:

Adapting Knowledge Prompt Tuning for Enhanced Automated Program Repair. 360-371 - Leo St. Amour

, Eli Tilevich, Muhammad Ali Gulzar:
A Metric for Measuring the Impact of Rare Paths on Program Coverage. 372-382 - Hanxiao Lu, Hongyu Cai, Yiming Liang, Antonio Bianchi, Z. Berkay Celik:

A Progressive Transformer for Unifying Binary Code Embedding and Knowledge Transfer. 383-393 - Andrea Gurioli, Maurizio Gabbrielli, Stefano Zacchiroli:

Is This You, LLM? Recognizing AI-written Programs with Multilingual Code Stylometry. 394-405 - Chi Zhang, Jian Zhang:

StriCT-Bj:A String Constraint Benchmark from Real Java Programs. 418-429 - Rongrong Shi, Yuxin He, Ying Liu, Zonghao Li, Jingxin Su, Haonan Tong:

ALOGO: A Novel and Effective Framework for Online Cross-Project Defect Prediction. 442-453 - Yuqing Wang

, Mika V. Mäntylä
, Jesse Nyyssölä, Ke Ping
, Liqiang Wang:
Cross-System Software Log-based Anomaly Detection Using Meta-Learning. 454-464 - Andrea Tonon, Meng Zhang, Bora Caglayan, Fei Shen, Tong Gui, MingXue Wang, Rong Zhou:

RADICE: Causal Graph Based Root Cause Analysis for System Performance Diagnostic. 465-475 - Gichan Lee, Hansae Ju, Scott Uk-Jin Lee:

Can We Trust the Actionable Guidance from Explainable AI Techniques in Defect Prediction? 476-487 - Shize Zhou, Lirong Fu, Peiyu Liu, Wenhai Wang:

BinEGA: Enhancing DNN-based Binary Code Similarity Detection through Efficient Graph Alignment. 488-499 - Pengfei He, Shaowei Wang, Shaiful Chowdhury, Tse-Hsun Chen:

Evaluating the Effectiveness and Efficiency of Demonstration Retrievers in RAG for Coding Tasks. 500-510 - Egor Shibaev, Denis Sushentsev, Yaroslav Golubev

, Aleksandr Khvorov:
Stack Trace Deduplication: Faster, More Accurately, and in More Realistic Scenarios. 511-521 - Jingzi Meng, Yuewu Wang, Lingguang Lei, Jiwu Jing, Pingjian Wang, Chunjing Kou, Peng Wang:

CapAssess: An Endeavor to Assess and Enhance Linux Capabilities Utilization. 533-544 - Soufyane Labsari, Imen Sayar, Nicolas Anquetil, Benoît Verhaeghe, Anne Etien:

Service Extraction from Object-Oriented Monolithic Systems: Supporting Incremental Migration. 545-550 - Yue Liu, Chakkrit Tantithamthavorn, Li Li:

Protect Your Secrets: Understanding and Measuring Data Exposure in VSCode Extensions. 551-562 - Iman Saberi, Amirreza Esmaeili, Fatemeh Hendijani Fard, Fuxiang Chen:

AdvFusion: Adapter-based Knowledge Transfer for Code Summarization on Code Language Models. 563-574 - Xiangchen Wu, Liang Wang, Xianping Tao:

EarlyPR: Early Prediction of Potential Pull-Requests from Forks. 575-586 - Luciana de Q. Leal Gomes, Melina Mongiovi, Sabrina Souto, Everton L. G. Alves:

The Hidden Challenges of Merging: A Tool-Based Exploration. 587-597 - Issam Oukhay, Moataz Chouchen, Ali Ouni, Fatemeh H. Fard:

On the Performance of Large Language Models for Code Change Intent Classification. 598-603 - Hiroto Sugimori, Shinpei Hayashi:

Revisiting Method-Level Change Prediction: A Comparative Evaluation at Different Granularities. 604-614 - Jin Zhang, Maoqi Peng, Yang Zhang:

An Empirical Study of Transformer Models on Automatically Templating GitHub Issue Reports. 615-626 - Atakan Serifoglu, Eray Tüzün:

Uncovering the Challenges: A Study of Corner Cases in Bug-Inducing Commits. 639-644 - Nicole Hoess, Carlos V. Paradis, Rick Kazman, Wolfgang Mauerer:

Does the Tool Matter? Exploring Some Causes of Threats to Validity in Mining Software Repositories. 645-656 - Zhi Chen, Lingxiao Jiang:

Evaluating Software Development Agents: Patch Patterns, Code Quality, and Issue Complexity in Real-World GitHub Scenarios. 657-668 - Henrique Gomes Nunes, Eduardo Figueiredo, Larissa Rocha Soares

, Sarah Nadi, Fischer Ferreira, Geanderson E. dos Santos:
Evaluating the Effectiveness of LLMs in Fixing Maintainability Issues in Real-World Projects. 669-680 - Genevieve Caumartin, Qiaolin Qin, Sharon Chatragadda, Janmitsinh Panjrolia, Heng Li, Diego Elias Costa:

Exploring the Potential of Llama Models in Automated Code Refinement: A Replication Study. 681-692 - Bhuwan Paudel

, Javier Gonzalez-Huerta, Ehsan Zabardast, Eriks Klotins:
Exploring the Relationship Between Technical Debt and Lead Time: An Industrial Case Study. 693-703 - Yao Shu, Lianyu Zheng, Jinfu Chen, Jifeng Xuan:

Characterizing Logs in Vulnerability Reports: In-Depth Analysis and Security Implications. 704-715 - Haojia Huang, Pengfei Chen, Guangba Yu, Haiyu Huang, Jia Chang, Jun Li, Jian Han:

Conan: Uncover Consensus Issues in Distributed Databases Using Fuzzing-Driven Fault Injection. 716-727 - Pedro Jesús Ruiz Jiménez, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein:

Dissecting APKs from Google Play: Trends, Insights and Security Implications. 728-739 - Lei Xiao, Shuo Yang, Wen Chen, Zibin Zheng:

WakeMint: Detecting Sleepminting Vulnerabilities in NFT Smart Contracts. 740-750 - Sushawapak Kancharoendee, Thanat Phichitphanphong, Chanikarn Jongyingyos, Brittany Reid

, Raula Gaikovina Kula, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta
:
On Categorizing Open Source Software Security Vulnerability Reporting Mechanisms on GitHub. 751-756 - Xuancheng Jin, Zhuang Liu, Junwei Zhang, Xing Hu, Xin Xia:

Tracets4J: A Traceable Unit Test Generation Dataset. 757-767 - Shuyao Jiang

, Ruiying Zeng, Yangfan Zhou, Michael R. Lyu:
Distinguishability-Guided Test Program Generation for WebAssembly Runtime Performance Testing. 768-779 - Neilson C. L. Ramalho, Érico Augusto da Silva, Higor Amario de Souza, Marcos Lordello Chaim:

Quantum Testing in the Wild: A Case Study with Qiskit Algorithms. 780-785 - Ronnie de Souza Santos, Ítalo Santos, Robson Santos, Cleyton V. C. de Magalhães

:
Hidden Figures in Software Engineering: A Replication Study Exploring Undergraduate Software Students' Awareness of Distinguished Scientists from Underrepresented Groups. 786-796 - Swanand Vaishampayan, Muhammad Ali Gulzar, Chris Brown:

Improving Evidence-Based Tech Hiring with GitHub-Supported Resume Matching. 797-808 - Yongqian Sun, Jiaju Wang, Zhengdan Li, Xiaohui Nie, Minghua Ma, Shenglin Zhang, Yuhe Ji, Lu Zhang, Wen Long, Hengmao Chen, Yongnan Luo, Dan Pei:

AIOpsArena: Scenario-Oriented Evaluation and Leaderboard for AIOps Algorithms in Microservices. 809-813 - Alexander Lercher, Clemens Bauer, Christian Macho, Martin Pinzger:

AutoGuard: Reporting Breaking Changes of REST APIs from Java Spring Boot Source Code. 814-818 - Xiaolin Liu

, Adel Belkhiri
, Mónica Jin
, Yi Li
, Cyrille Artho
:
ContractViz: Extending Eclipse Trace Compass for Smart Contract Transaction Analysis. 819-823 - Aman Swaraj, Neha Gujar, Manashree Kalode, Bhoomi Bonal, Krishna Agarwal, Sandeep Kumar:

DATSO: A Difficulty Assessment Tool for Stack Overflow Questions. 824-828 - Heyuan Shi, Weibo Zhang, Runzhe Wang, Xiaohai Shi, Guoyu Yin, Shijun Chen, Yuhan Chen, Qiang Zhang, Jianzhong Liu, Yuheng Shen:

DragonRadar: Fuzzing Linux Kernel Deployed in Cloud-Native Environment. 829-833 - Jasem Khelifi, Yacine Benzina, Moataz Chouchen, Ali Ouni, Mohammed Sayagh, Salah Bouktif:

GHAminer: An Open Source Tool to Extract GitHub Actions Build Metrics. 834-838 - Xixuan Yang, Tong Jia, Ying Li, Gang Huang:

IFKG: An Intelligent Fault Diagnosis Tool with Knowledge Graph and Generative LLM. 839-843 - Eman Abdullah AlOmar, Catherine DeMario, Roger Shagawat, Brandon Kreiser:

LeakageDetector: An Open Source Data Leakage Analysis Tool in Machine Learning Pipelines. 844-849 - Artur Boronat

, Jawad Mustafa:
MDRE-LLM: A Tool for Analyzing and Applying LLMs in Software Reverse Engineering. 850-854 - Md. Siam, Mridha Md. Nafis Fuad, Kazi Sakib:

An Exploratory Study on the Impact of Change-Proneness as a Metric in Black-Box Test Suite Minimization. 855-860 - Jameleddine Hassine:

Evaluating Multi-Modal LLMs for Automatically Recognizing Semantic Elements in UML Use Case Diagram Images. 861-866 - Kaiyan He, Haining Lu, Dawu Gu:

MultiMal: Multimodal Fusion Combining Graph and Entropy Features for Malware Detection. 867-872 - Omar I. Al-Bataineh:

Towards Developing Effective Oracles to Reduce Patch Overfitting in Automated Program Repair. 879-884 - Jukka Ruohonen

:
An Empirical Study of Vulnerability Handling Times in CPython. 891-896

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














