Blogs (1) >>
ASE 2019
Sun 10 - Fri 15 November 2019 San Diego, California, United States

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2019 invites high quality contributions describing significant, original, and unpublished results.

Dates
Tracks
You're viewing the program in a time zone which is different from your device's time zone - change time zone

Tue 12 Nov
Times are displayed in time zone: Tijuana, Baja California change

08:30 - 10:00: Plenary SessionPapers / Research Papers at Cortez Ballroom
08:30 - 09:00
Welcome from the Chairs
Research Papers
09:00 - 10:00
Talk
Re-engineering Software Engineering for a Data-centric World
Research Papers
Miryung KimUniversity of California, Los Angeles
10:00 - 10:40: Poster Session: Tool Demonstrations 1Demonstrations at Kensington Ballroom
10:00 - 10:40
Demonstration
Pangolin: An SFL-based Toolset for Feature Localization
Demonstrations
Bruno Miguel Sotto-Mayor de Castro MachadoIST, University of Lisbon, Alexandre PerezPalo Alto Research Center, Rui AbreuInstituto Superior Técnico, U. Lisboa & INESC-ID
10:00 - 10:40
Demonstration
A Quantitative Analysis Framework for Recurrent Neural Network
Demonstrations
Xiaoning DuNanyang Technological University, Xiaofei XieNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University
10:00 - 10:40
Demonstration
Ares: Inferring Error Specifications through Static Analysis
Demonstrations
Li ChiTsinghua University, Zuxing GuSchool of Software, Tsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Hongyu ZhangThe University of Newcastle
10:00 - 10:40
Demonstration
SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-based Analysis of Variant-Rich Software
Demonstrations
Dennis ReulingSoftware Engineering Group, University of Siegen, Udo KelterSoftware Engineering Group, University of Siegen, Sebastian RulandTU Darmstadt, Real-time Systems Lab, Malte LochauTU Darmstadt
Pre-print Media Attached File Attached
10:00 - 10:40
Demonstration
VeriAbs : Verification by Abstraction and Test Generation
Demonstrations
Mohammad AfzalTata Cosultancy Services, A AsiaTata Cosultancy Services, Avriti ChauhanTata Cosultancy Services, Bharti ChimdyalwarTata Consultancy Services, Priyanka DarkeTata Consultancy Services, Advaita DatarTata Consultancy Services Ltd, Shrawan KumarTata Cosultancy Services, R VenkateshTata Research Development and Design Centre
10:00 - 10:40
Demonstration
DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks
Demonstrations
Xiaofei XieNanyang Technological University, Hongxu ChenNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University
10:00 - 10:40
Demonstration
SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs
Demonstrations
Xutong MaInstitute of Software, Chinese Academy of Sciences, Jiwei YanInstitute of Software, Chinese Academy of Sciences, Yaqi LiInstitute of Software, Chinese Academy of Sciences, Jun YanInstitute of Software, Chinese Academy of Sciences, Jian ZhangInstitute of Software, Chinese Academy of Sciences
10:00 - 10:40
Demonstration
LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform
Demonstrations
Shengcheng YuNanjing University, China, Chunrong FangNanjing University, Yang FengUniversity of California, Irvine, Wenyuan ZhaoNanjing University, Zhenyu ChenNanjing University
File Attached
10:00 - 10:40
Demonstration
FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing
Demonstrations
Xiao LiuSchool of Information Technology, Deakin University, Lingmin FanSchool of Computer Science and Technology, Anhui University, Jia XuSchool of Computer Science and Technology, Anhui University, Xuejun LiSchool of Computer Science and Technology, Anhui University, Lina GongSchool of Computer Science and Technology, Anhui University, John GrundyMonash University, Yun YangSwinburne University of Technology
10:00 - 10:40
Demonstration
SGUARD: A Feature-based Clustering Tool for Effective Spreadsheet Defect Detection
Demonstrations
Da LiState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Huiyan WangState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Chang XuNanjing University, Ruiqing ZhangSearch Tech. Center Asia, Microsoft, Suzhou, China, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Xiaoxing MaState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University
10:00 - 10:40
Demonstration
FPChecker: Detecting Floating-Point Exceptions in GPU Applications
Demonstrations
Ignacio LagunaLawrence Livermore National Laboratory
10:00 - 10:40
Demonstration
PMExec: An Execution Engine of Partial UML-RT Models
Demonstrations
Mojtaba BagherzadehQueen's University, Karim JahedQueen's University, Nafiseh KahaniQueen's University, Juergen DingelQueen's University, Kingston, Ontario
Pre-print
10:40 - 12:20: Testing and CoveragePapers / Research Papers / Demonstrations / Journal First Presentations / Industry Showcase at Cortez 1
Chair(s): Jonathan BellGeorge Mason University
10:40 - 11:00
Talk
Automatic Self-Validation for Code Coverage Profilers
Research Papers
Yibiao YangHuazhong University of Science and Technology, Yanyan JiangNanjing University, Zhiqiang ZuoNanjing University, China, Yang WangNanjing University, Hao SunUnaffiliated, Hongmin LuNanjing University, Yuming ZhouNanjing University, Baowen XuNanjing University
Pre-print
11:00 - 11:20
Talk
Efficient Test Generation Guided by Field Coverage Criteria
Research Papers
Ariel GodioDept. of Software Engineering Instituto Tecnológico de Buenos Aires, Valeria BengoleaDept. of Computer Science FCEFQyN, University of Rio Cuarto, Pablo PonzioDept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno AguirreDept. of Computer Science FCEFQyN, University of Rio Cuarto, Marcelo F. FriasDept. of Software Engineering Instituto Tecnológico de Buenos Aires
11:20 - 11:40
Talk
Exploring Output-Based Coverage for Testing PHP Web Applications
Journal First Presentations
Hung Viet NguyenGoogle LLC, USA, Hung Dang PhanECpE Department, Iowa State University, Christian KästnerCarnegie Mellon University, Tien N. NguyenUniversity of Texas at Dallas
Link to publication
11:40 - 12:00
Talk
PHANTA: Diversified Test Code Quality Measurement for Modern Software Development
Industry Showcase
Susumu TokumotoFujitsu Laboratories Ltd., Kuniharu TakayamaFujitsu Laboratories Ltd.
Media Attached
12:00 - 12:10
Demonstration
TestCov: Robust Test-Suite Execution and Coverage Measurement
Demonstrations
Dirk BeyerLMU Munich, Thomas LembergerLMU Munich
Pre-print Media Attached File Attached
12:10 - 12:20
Demonstration
VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization
Demonstrations
Chijin ZhouTsinghua University, Mingzhe WangTsinghua University, Jie LiangTsinghua University, Zhe LiuNanjing University of Aeronautics and Astronautics, Chengnian SunWaterloo University, Yu JiangTsinghua University
10:40 - 12:20: AI and SEPapers / Research Papers / Journal First Presentations / Demonstrations at Cortez 2&3
Chair(s): Kaiyuan WangGoogle, Inc.
10:40 - 11:00
Talk
Assessing the Generalizability of code2vec Token Embeddings
Research Papers
Kang Hong JinSchool of Information Systems, Singapore Management University, Tegawendé F. BissyandéSnT, University of Luxembourg, David LoSingapore Management University
Pre-print
11:00 - 11:20
Talk
Multi-Modal Attention Network Learning for Semantic Source Code Retrieval
Research Papers
Yao WanZhejiang University, Jingdong ShuZhejiang University, Yulei SuiUniversity of Technology Sydney, Australia, Guandong XuUniversity of Technology, Sydney, Zhou ZhaoZhejiang University, Jian WuZhejiang University, philip yuUniversity of Illinois at Chicago
11:20 - 11:40
Talk
Experience Paper: Search-based Testing in Automated Driving Control ApplicationsACM SIGSOFT Distinguished Paper Award
Research Papers
Christoph GladischCorporate Research, Robert Bosch GmbH, Thomas HeinzCorporate Research, Robert Bosch GmbH, Christian HeinzemannCorporate Research, Robert Bosch GmbH, Jens OehlerkingCorporate Research, Robert Bosch GmbH, Anne von VietinghoffCorporate Research, Robert Bosch GmbH, Tim PfitzerRobert Bosch Automotive Steering GmbH
11:40 - 12:00
Talk
Machine Translation-Based Bug Localization Technique for Bridging Lexical Gap
Journal First Presentations
Yan XiaoDepartment of Computer Science, City University of Hong Kong, Jacky KeungDepartment of Computer Science, City University of Hong Kong, Kwabena E. BenninBlekinge Institute of Technology, SERL Sweden, Qing MiDepartment of Computer Science, City University of Hong Kong
Link to publication
12:00 - 12:10
Talk
AutoFocus: Interpreting Attention-based Neural Networks by Code Perturbation
Research Papers
Nghi D. Q. BuiSingapore Management University, Singapore, Yijun YuThe Open University, UK, Lingxiao JiangSingapore Management University
Pre-print
12:10 - 12:20
Demonstration
A Quantitative Analysis Framework for Recurrent Neural Network
Demonstrations
Xiaoning DuNanyang Technological University, Xiaofei XieNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University
10:40 - 12:20: Mobile 1Papers / Demonstrations / Research Papers / Journal First Presentations at Hillcrest
Chair(s): Marouane KessentiniUniversity of Michigan
10:40 - 11:00
Talk
Test Transfer Across Mobile Apps Through Semantic Mapping
Research Papers
Jun-Wei LinUniversity of California, Irvine, Reyhaneh JabbarvandUniversity of California, Irvine, Sam MalekUniversity of California, Irvine
11:00 - 11:20
Talk
Test Migration Between Mobile Apps with Similar Functionality
Research Papers
Farnaz BehrangGeorgia Tech, Alessandro OrsoGeorgia Tech
11:20 - 11:40
Talk
DaPanda: Detecting Aggressive Push Notification in Android Apps
Research Papers
Tianming LiuBeijing University of Posts and Telecommunications, China, Haoyu WangBeijing University of Posts and Telecommunications, China, Li LiMonash University, Australia, Guangdong BaiGriffith University, Yao GuoPeking University, Guoai Xu Beijing University of Posts and Telecommunications
11:40 - 12:00
Talk
Automatic, highly accurate app permission recommendation
Journal First Presentations
Zhongxin LiuZhejiang University, Xin XiaMonash University, David LoSingapore Management University, John GrundyMonash University
Link to publication
12:00 - 12:10
Demonstration
LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform
Demonstrations
Shengcheng YuNanjing University, China, Chunrong FangNanjing University, Yang FengUniversity of California, Irvine, Wenyuan ZhaoNanjing University, Zhenyu ChenNanjing University
File Attached
12:10 - 12:20
Demonstration
Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing
Demonstrations
Yuanchun LiPeking University, Ziyue YangPeking University, Yao GuoPeking University, Xiangqun ChenPeking University
13:40 - 15:20: Testing and VerificationPapers / Research Papers / Demonstrations / Industry Showcase at Cortez 1
Chair(s): Weihang WangUniversity at Buffalo, SUNY
13:40 - 14:00
Talk
Systematically Covering Input Structure
Research Papers
Nikolas HavrikovCISPA Helmholtz Center for Information Security, Andreas ZellerCISPA Helmholtz Center for Information Security
Pre-print
14:00 - 14:20
Talk
SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs
Research Papers
Devika SondhiIIIT Delhi, Rahul PurandareIIIT-Delhi
Pre-print
14:20 - 14:40
Talk
Detecting Error-Handling Bugs without Error Specification Input
Research Papers
Zhouyang JiaNational University of Defense Technology, Shanshan LiNational University of Defense Technology, Tingting YuUniversity of Kentucky, Xiangke LiaoNational University of Defense Technology, China, Ji WangNational University of Defense Technology, Xiaodong LiuNational University of Defense Technology, Yunhuai LiuPeking University
14:40 - 15:00
Talk
Test Automation and its Limitations
Industry Showcase
Ahyoung SungSamsung Electronics, Yangsu KimSamsung Electronics, Sangjun KimSamsung Electronics, Jongin KimSamsung Electronics, Neo JangSamsung Electronics
15:00 - 15:10
Talk
Grading-Based Test Suite Augmentation
Research Papers
Jonathan Osei-OwusuUniversity of Illinois at Urbana-Champaign, Angello AstorgaUniversity of Illinois at Urbana-Champaign, Liia ButlerUniversity of Illinois at Urbana-Champaign, Tao XiePeking University, Geoffrey ChallenUniversity of Illinois at Urbana-Champaign
15:10 - 15:20
Demonstration
MutAPK: Source-Codeless Mutant Generation for Android Apps
Demonstrations
Camilo Escobar-VelásquezUniversidad de los Andes, Michael Osorio-RiañoUniversidad de los Andes, Mario Linares-VásquezSystems and Computing Engineering Department , Universidad de los Andes , Bogotá, Colombia
13:40 - 15:20: Natural Language and Human AspectsPapers / Research Papers / Demonstrations / Journal First Presentations at Cortez 2&3
Chair(s): Bogdan VasilescuCarnegie Mellon University
13:40 - 14:00
Talk
Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites
Research Papers
Xiaoxue RenZhejiang University, Zhenchang XingAustralia National University, Xin XiaMonash University, Guoqiang LiShanghai Jiao Tong University, Jianling SunZhejiang University
Pre-print
14:00 - 14:20
Talk
Automating App Review Response Generation
Research Papers
Cuiyun GaoNanyang Technological University, Singapore, Jichuan ZengThe Chinese University of Hong Kong, Xin XiaMonash University, David LoSingapore Management University, Michael LyuThe Chinese University of Hong Kong, Irwin KingThe Chinese University of Hong Kong
Pre-print
14:20 - 14:40
Talk
Automatic Generation of Pull Request DescriptionsACM SIGSOFT Distinguished Paper Award
Research Papers
Zhongxin LiuZhejiang University, Xin XiaMonash University, Christoph TreudeThe University of Adelaide, David LoSingapore Management University, Shanping LiZhejiang University
Pre-print
14:40 - 15:00
Talk
Recommending Who to Follow in the Software Engineering Twitter Space
Journal First Presentations
Abhishek Sharma Singapore Management University, Singapore, Yuan TianQueens University, Kingston, Canada, Agus SulistyaSchool of Information Systems, Singapore Management University, Dinusha WijedasaSchool of Information Systems, Singapore Management University, David LoSingapore Management University
Pre-print
15:00 - 15:10
Demonstration
Developer Reputation Estimator (DRE)
Demonstrations
Sadika AmreenUniversity of Tennessee Knoxville, Andrey KarnauchUniversity of Tennessee Knoxville, Audris MockusUniversity of Tennessee - Knoxville
15:10 - 15:20
Demonstration
CocoQa: Question Answering for Coding Conventions over Knowledge Graphs
Demonstrations
Tianjiao DuShanghai JiaoTong University, Junming CaoShanghai JiaoTong University, Qinyue WuShanghai JiaoTong University, Wei LiShanghai JiaoTong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yuting ChenShanghai Jiao Tong University
13:40 - 15:20: Mobile 2Papers / Research Papers / Journal First Presentations at Hillcrest
Chair(s): Myra CohenIowa State University
13:40 - 14:00
Talk
A Qualitative Analysis of Android Taint-Analysis Results
Research Papers
Linghui LuoPaderborn University, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Johannes SpäthFraunhofer IEM
Pre-print File Attached
14:00 - 14:20
Talk
Goal-Driven Exploration for Android Applications
Research Papers
Duling LaiUniversity of British Columbia, Julia RubinUniversity of British Columbia
Pre-print
14:20 - 14:40
Talk
RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation
Research Papers
Onur SahinBoston University, Assel AliyevaBoston University, Hariharan MathavanBoston University, Ayse CoskunBoston University, Manuel EgeleBoston University, USA
14:40 - 15:00
Talk
Specifying Callback Control Flow of Mobile Apps Using Finite Automata
Journal First Presentations
Danilo Dominguez PerezIowa State University, Wei LeIowa State University
Link to publication
15:00 - 15:20
Talk
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Research Papers
Yueming WuHuazhong University of Science and Technology, Xiaodi LiUniversity of Texas at Dallas, Deqing ZouHuazhong University of Science and Technology, Wei YangUniversity of Texas at Dallas, Xin ZhangHuazhong University of Science and Technology, Hai JinHuazhong University of Science and Technology
Pre-print
16:00 - 17:40: Testing and VisualizationPapers / Demonstrations / Research Papers / Journal First Presentations at Cortez 1
Chair(s): Amin AlipourUniversity of Houston
16:00 - 16:20
Talk
History-Guided Configuration Diversification for Compiler Test-Program GenerationACM SIGSOFT Distinguished Paper Award
Research Papers
Junjie ChenTianjin University, Guancheng WangPeking University, Dan HaoPeking University, Yingfei XiongPeking University, Hongyu ZhangThe University of Newcastle, Lu ZhangPeking University
16:20 - 16:40
Talk
Data-Driven Compiler Testing and Debugging
Research Papers
Junjie ChenTianjin University
16:40 - 17:00
Talk
Targeted Example Generation for Compilation Errors
Research Papers
Umair Z. AhmedNational University of Singapore, Renuka SindhgattaQueensland University of Technology, Australia, Nisheeth SrivastavaIndian Institute of Technology, Kanpur, Amey KarkareIIT Kanpur
Link to publication Pre-print
17:00 - 17:20
Talk
Lightweight Assessment of Test-Case Effectiveness using Source-Code-Quality Indicators
Journal First Presentations
Giovanni GranoUniversity of Zurich, Fabio PalombaDepartment of Informatics, University of Zurich, Harald GallUniversity of Zurich
Link to publication Pre-print
17:20 - 17:30
Demonstration
Visual Analytics for Concurrent Java Executions
Demonstrations
Cyrille ArthoKTH Royal Institute of Technology, Sweden, Monali PandeKTH Royal Institute of Technology, Qiyi TangUniversity of Oxford
17:30 - 17:40
Demonstration
NeuralVis: Visualizing and Interpreting Deep Learning Models
Demonstrations
Xufan ZhangState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Ziyue YinState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Yang FengUniversity of California, Irvine, Qingkai ShiHong Kong University of Science and Technology, Jia LiuState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Zhenyu ChenNanjing University
16:00 - 17:40: Code and Artifact AnalysisPapers / Journal First Presentations / Research Papers at Cortez 2&3
Chair(s): Sarah NadiUniversity of Alberta
16:00 - 16:20
Talk
Emotions Extracted from Text vs. True Emotions –An Empirical Evaluation in SE Context
Research Papers
Yi WangRochester Institute of Technology
16:20 - 16:40
Talk
Collaborative feature location in models through automatic query expansion
Journal First Presentations
Francisca PérezSVIT Research GroupUniversidad San Jorge, Jaime FontSan Jorge University, Spain, Lorena ArcegaSan Jorge University, Carlos CetinaSan Jorge University, Spain
Link to publication
16:40 - 17:00
Talk
Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets
Research Papers
C M Khaled SaifullahDepartment of Computer Science, University of Saskatchewan, Muhammad AsaduzzamanPostdoctoral Research Fellow, Software Analysis and Intelligence Lab, Queen's University, Canada, Chanchal K. RoyUniversity of Saskatchewan
Pre-print
17:00 - 17:20
Talk
Inferring Program Transformations From Singular Examples via Big Code
Research Papers
Jiajun JiangPeking University, Luyao RenPeking University, Yingfei XiongPeking University, Lingming ZhangThe University of Texas at Dallas
Link to publication Pre-print
17:20 - 17:40
Talk
Extracting and studying the Logging-Code-Issue-Introducing changes in Java-based large-scale open source software systems
Journal First Presentations
Boyuan ChenYork University, Zhen Ming (Jack) JiangYork University
Link to publication
16:00 - 17:40: SecurityPapers / Demonstrations / Research Papers / Journal First Presentations at Hillcrest
Chair(s): Julia RubinUniversity of British Columbia
16:00 - 16:20
Talk
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint AnalysisACM SIGSOFT Distinguished Paper Award
Research Papers
Dongjie HeUniversity of New South Wales; Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Haofeng LiInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Lei WangInstitute of Computing Technology, Chinese Academy of Science, Haining MengInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Hengjie ZhengInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Jie LiuUniversity of New South Wales, Shuangwei Huvivo AI Lab, Lian LiInstitute of Computing Technology at Chinese Academy of Sciences, China, Jingling XueUNSW Sydney
16:20 - 16:40
Talk
Characterizing Android App Signing Issues
Research Papers
Haoyu WangBeijing University of Posts and Telecommunications, China, Hongxuan LiuPeking University, Xusheng XiaoCase Western Reserve University, Guozhu MengInstitute of Information Engineering, Chinese Academy of Sciences, Yao GuoPeking University
16:40 - 17:00
Talk
OAuthLint: An Empirical Study on OAuth Bugs in Android Applications
Research Papers
Tamjid Al RahatUniversity of Virginia, Yu FengUniversity of California, Santa Barbara, Yuan TianUniversity of Virginia
Pre-print
17:00 - 17:20
Talk
Are Free Android App Security Analysis Tools Effective in Detecting Known Vulnerabilities?
Journal First Presentations
Venkatesh-Prasad RanganathKansas State University, Joydeep MitraKansas State University
Link to publication DOI Pre-print Media Attached
17:20 - 17:30
Demonstration
SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Demonstrations
Goran PiskachevFraunhofer IEM, Lisa Nguyen Quang DoGoogle, Oshando JohnsonFraunhofer IEM, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM
Pre-print Media Attached File Attached
17:30 - 17:40
Demonstration
Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs
Demonstrations
Ayesha SadiqMonash University, Li LiMonash University, Australia, Yuan-Fang LiMonash University, Ijaz AhmedUniversity of Lahore, Sea LingMonash University

Wed 13 Nov
Times are displayed in time zone: Tijuana, Baja California change

08:30 - 10:00: Plenary SessionPapers / Research Papers at Cortez Ballroom
08:30 - 09:00
Awards
ASE Award Ceremony
Research Papers
09:00 - 10:00
Talk
The Human Dimension of Cloud Computing
Research Papers
Yuanyuan ZhouUniversity of California, San Diego
10:00 - 10:40: Poster Session: Tool Demonstrations 2Demonstrations at Kensington Ballroom
10:00 - 10:40
Demonstration
TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis
Demonstrations
Yuexing WangTsinghua University, Guang ChenTsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Jiaguang SunTsinghua University
10:00 - 10:40
Demonstration
BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules
Demonstrations
Pavan ChittimalliTCS Research, Kritika AnandTCS Research, Shrishti PradhanTCS Research, Sayandeep MitraTCS Research, Chandan PrakashTCS Research, Rohit ShereTCS Research, Ravindra NaikTCS Research, TRDDC, India
10:00 - 10:40
Demonstration
Lancer: Your Code Tell Me What You Need
Demonstrations
Shufan ZhouSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University
10:00 - 10:40
Demonstration
TestCov: Robust Test-Suite Execution and Coverage Measurement
Demonstrations
Dirk BeyerLMU Munich, Thomas LembergerLMU Munich
Pre-print Media Attached File Attached
10:00 - 10:40
Demonstration
Prema: A Tool for Precise Requirements Editing, Modeling and Analysis
Demonstrations
Yihao HuangEast China Normal University, Jincao FengEast China Normal University, Hanyue ZhengEast China Normal University, Jiayi ZhuEast China Normal University, Shang WangEast China Normal University, Siyuan JiangEastern Michigan University, Weikai MiaoShanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang PuEast China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd
10:00 - 10:40
Demonstration
XRaSE: Towards Virtually Tangible Software using Augmented Reality
Demonstrations
Rohit MehraAccenture Labs, India, Vibhu Saujanya SharmaAccenture Labs, Vikrant KaulgudAccenture Labs, India, Sanjay PodderAccenture
10:00 - 10:40
Demonstration
MuSC: A Tool for Mutation Testing of Ethereum Smart Contract
Demonstrations
Zixin LiNanjing University, Haoran WuState Key Laboratory for Novel Software Technology, Nanjing University, Jiehui XuNanjing University, Xingya WangState Key Laboratory for Novel Software Technology, Nanjing University, Lingming ZhangThe University of Texas at Dallas, Zhenyu ChenNanjing University
10:00 - 10:40
Demonstration
VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq
Demonstrations
Bernd FischerStellenbosch University, Salvatore La TorreUniversità degli Studi di Salerno, Gennaro ParlatoUniversity of Molise
10:00 - 10:40
Demonstration
DeepMutation++: a Mutation Testing Framework for Deep Learning Systems
Demonstrations
Qiang HuKyushu University, Japan, Lei MaKyushu University, Xiaofei XieNanyang Technological University, Bing YuKyushu University, Japan, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University
10:00 - 10:40
Demonstration
Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts
Demonstrations
Mark MossbergTrail of Bits, Felipe ManzanoTrail of Bits, Eric HennenfentTrail of Bits, Alex GroceTrail of Bits, Gustavo GriecoTrail of Bits, Josselin FeistTrail of Bits, Trent BrunsonTrail of Bits, Artem DinaburgTrail of Bits
Media Attached
10:00 - 10:40
Demonstration
ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities
Demonstrations
Ruijie MengUniversity of Chinese Academy of Sciences, Biyun ZhuUniversity of Chinese Academy of Sciences, Hao YunUniversity of Chinese Academy of Sciences, Haicheng LiUniversity of Chinese Academy of Sciences, Yan CaiInstitute of Software, Chinese Academy of Sciences, Zijiang YangWestern Michigan University
10:00 - 10:40
Demonstration
mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines
Demonstrations
Reza AhmadiQueen's University, Karim JahedQueen's University, Juergen DingelQueen's University, Kingston, Ontario
10:40 - 12:20: Testing and Program AnalysisPapers / Research Papers / Demonstrations at Cortez 1
Chair(s): Jun SunSingapore Management University, Singapore
10:40 - 11:00
Talk
Regexes are Hard: Decision-making, Difficulties, and Risks in Programming Regular ExpressionsACM SIGSOFT Distinguished Paper Award
Research Papers
Louis G. Michael IVVirginia Tech, James DonohueUniversity of Bradford, James C. DavisVirginia Tech, USA, Dongyoon LeeStony Brook University, Francisco ServantVirginia Tech
Pre-print File Attached
11:00 - 11:20
Talk
Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study
Research Papers
James C. DavisVirginia Tech, USA, Daniel MoyerVirginia Tech, Ayaan M. KazerouniVirginia Tech, Dongyoon LeeStony Brook University
Pre-print File Attached
11:20 - 11:40
Talk
Accurate String Constraints Solution Counting with Weighted Automata
Research Papers
Elena ShermanBoise State University, Andrew HarrisBoise State University
11:40 - 12:00
Talk
Subformula Caching for Model Counting and Quantitative Program Analysis
Research Papers
William EiersUniversity of California at Santa Barbara, USA, Seemanta SahaUniversity of California Santa Barbara, Tegan BrennanUniversity of California, Santa Barbara, Tevfik BultanUniversity of California, Santa Barbara
12:00 - 12:10
Demonstration
SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs
Demonstrations
Xutong MaInstitute of Software, Chinese Academy of Sciences, Jiwei YanInstitute of Software, Chinese Academy of Sciences, Yaqi LiInstitute of Software, Chinese Academy of Sciences, Jun YanInstitute of Software, Chinese Academy of Sciences, Jian ZhangInstitute of Software, Chinese Academy of Sciences
12:10 - 12:20
Demonstration
FPChecker: Detecting Floating-Point Exceptions in GPU Applications
Demonstrations
Ignacio LagunaLawrence Livermore National Laboratory
10:40 - 12:20: Program RepairPapers / Research Papers / Demonstrations / Journal First Presentations at Cortez 2&3
Chair(s): Yingfei XiongPeking University
10:40 - 11:00
Talk
Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models
Research Papers
Hao ZhangCity University of Hong Kong, Wing-Kwong ChanCity University of Hong Kong, Hong Kong
11:00 - 11:20
Talk
Re-factoring based Program Repair applied to Programming Assignments
Research Papers
Yang HuThe University of Texas at Austin, Umair Z. AhmedNational University of Singapore, Sergey MechtaevUniversity College London, Ben LeongNational University of Singapore, Abhik RoychoudhuryNational University of Singapore
Pre-print
11:20 - 11:40
Talk
InFix: Automatically Repairing Novice Program Inputs
Research Papers
Madeline EndresUniversity of Michigan, Georgios SakkasUniversity of California, San Diego, Benjamin CosmanUniversity of California at San Diego, USA, Ranjit JhalaUniversity of California, San Diego, Westley WeimerUniversity of Michigan
Pre-print
11:40 - 12:00
Talk
Astor: Exploring the Design Space of Generate-and-Validate Program Repair beyond GenProg
Journal First Presentations
Matias MartinezUniversité Polytechnique Hauts-de-France, Martin MonperrusKTH Royal Institute of Technology
Pre-print
12:00 - 12:10
Demonstration
PraPR: Practical Program Repair via Bytecode Mutation
Demonstrations
Ali GhanbariThe University of Texas at Dallas, Lingming ZhangThe University of Texas at Dallas
12:10 - 12:20
Talk
Understanding Automatically-Generated Patches Through Symbolic Invariant Differences
Research Papers
Padraic CashinArizona State University, Cari MartinezUniversity of New Mexico, Stephanie ForrestArizona State University, Westley WeimerUniversity of Michigan
Pre-print
10:40 - 12:20: Cloud and Online ServicesPapers / Journal First Presentations / Research Papers / Demonstrations at Hillcrest
Chair(s): Dan HaoPeking University
10:40 - 11:00
Talk
Understanding Exception-Related Bugs in Large-Scale Cloud Systems
Research Papers
Haicheng ChenThe Ohio State University, Wensheng DouInstitute of Software, Chinese Academy of Sciences, Yanyan JiangNanjing University, Feng QinOhio State University, USA
Pre-print Media Attached
11:00 - 11:20
Talk
iFeedback: Exploiting User Feedback for Real-time Issue Detection in Large-Scale Online Service Systems
Research Papers
Wujie ZhengTencent, Inc., Haochuan LuFudan University, Yangfan ZhouFudan University, Jianming LiangTencent, Haibing ZhengTencent, Yuetang DengTencent, Inc.
11:20 - 11:40
Talk
Software Microbenchmarking in the Cloud. How Bad is it Really?
Journal First Presentations
Christoph LaaberUniversity of Zurich, Joel ScheunerChalmers | University of Gothenburg, Philipp LeitnerChalmers University of Technology & University of Gothenburg
Link to publication Pre-print
11:40 - 12:00
Talk
Continuous Incident Triage for Large-Scale Online Service Systems
Research Papers
Junjie ChenTianjin University, Xiaoting HeMicrosoft, Qingwei LinMicrosoft Research, China, Hongyu ZhangThe University of Newcastle, Dan HaoPeking University, Feng GaoMicrosoft, Zhangwei XuMicrosoft, Yingnong DangMicrosoft Azure, Dongmei ZhangMicrosoft Research, China
12:00 - 12:10
Demonstration
Kotless: a Serverless Framework for Kotlin
Demonstrations
Vladislav TankovJetBrains, ITMO University, Yaroslav GolubevJetBrains Research, ITMO University, Timofey BryksinJetBrains Research, Saint-Petersburg State University
12:10 - 12:20
Demonstration
FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing
Demonstrations
Xiao LiuSchool of Information Technology, Deakin University, Lingmin FanSchool of Computer Science and Technology, Anhui University, Jia XuSchool of Computer Science and Technology, Anhui University, Xuejun LiSchool of Computer Science and Technology, Anhui University, Lina GongSchool of Computer Science and Technology, Anhui University, John GrundyMonash University, Yun YangSwinburne University of Technology
13:40 - 15:20: Verification and Bug DetectionPapers / Demonstrations / Research Papers at Cortez 1
Chair(s): Raghavan KomondoorIndian Institute of Science, Bangalore
13:40 - 14:00
Talk
Mutation Analysis for Coq
Research Papers
Ahmet CelikThe University of Texas at Austin, Karl PalmskogUniversity of Texas at Austin, Marinela ParovicThe University of Texas at Austin, Emilio Jesús Gallego AriasMINES ParisTech, Milos GligoricThe University of Texas at Austin
14:00 - 14:20
Talk
Verifying Arithmetic in Cryptographic C Programs
Research Papers
Jiaxiang LiuShenzhen University, Xiaomu ShiShenzhen University, Ming-Hsien TsaiAcademia Sinica, Taiwan, Bow-Yaw WangAcademia Sinica, Bo-Yin YangAcademia Sinica
Pre-print
14:20 - 14:40
Talk
Model checking embedded control software using OS-in-the-loop CEGAR
Research Papers
Dongwoo KimKyungpook National University, Yunja ChoiKyungpook National University
Pre-print
14:40 - 15:00
Talk
Get rid of inline assembly through verification-oriented lifting
Research Papers
Frédéric RecoulesCEA LIST, Sebastien BardinCEA LIST, Richard BonichonCEA LIST, Laurent MounierUniversité Grenoble Alpes, Marie-Laure PotetUniversité Grenoble Alpes
DOI Pre-print
15:00 - 15:10
Demonstration
VeriAbs : Verification by Abstraction and Test Generation
Demonstrations
Mohammad AfzalTata Cosultancy Services, A AsiaTata Cosultancy Services, Avriti ChauhanTata Cosultancy Services, Bharti ChimdyalwarTata Consultancy Services, Priyanka DarkeTata Consultancy Services, Advaita DatarTata Consultancy Services Ltd, Shrawan KumarTata Cosultancy Services, R VenkateshTata Research Development and Design Centre
15:10 - 15:20
Demonstration
SGUARD: A Feature-based Clustering Tool for Effective Spreadsheet Defect Detection
Demonstrations
Da LiState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Huiyan WangState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Chang XuNanjing University, Ruiqing ZhangSearch Tech. Center Asia, Microsoft, Suzhou, China, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Xiaoxing MaState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University
13:40 - 15:20: Systems and LocalizationPapers / Industry Showcase / Research Papers / Demonstrations at Cortez 2&3
Chair(s): Tegawendé F. BissyandéSnT, University of Luxembourg
13:40 - 14:00
Talk
Combining Spectrum-Based Fault Localization and Statistical Debugging: An Empirical Study
Research Papers
Jiajun JiangPeking University, Ran WangPeking University, Yingfei XiongPeking University, Xiangping ChenSun Yat-sen University, Lu ZhangPeking University
Pre-print
14:00 - 14:20
Talk
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Research Papers
Tarannum Shaila ZamanUniversity of Kentucky, Xue HanUniversity of Kentucky, Tingting YuUniversity of Kentucky
Pre-print File Attached
14:20 - 14:40
Talk
Root Cause Localization for Unreproducible Builds via Causality Analysis over System Call Tracing
Research Papers
Zhilei RenDalian University of Technology, Changlin LiuCase Western Reserve University, Xusheng XiaoCase Western Reserve University, He JiangSchool of Software, Dalian University of Technology, Tao XiePeking University
14:40 - 15:00
Talk
PTracer: A Linux Kernel Patch Trace Bot
Industry Showcase
Yang WenZTE Corporation, Jicheng CaoZTE Corporation, Shengyu ChengZTE Corporation
15:00 - 15:10
Demonstration
Pangolin: An SFL-based Toolset for Feature Localization
Demonstrations
Bruno Miguel Sotto-Mayor de Castro MachadoIST, University of Lisbon, Alexandre PerezPalo Alto Research Center, Rui AbreuInstituto Superior Técnico, U. Lisboa & INESC-ID
15:10 - 15:20
Demonstration
SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-based Analysis of Variant-Rich Software
Demonstrations
Dennis ReulingSoftware Engineering Group, University of Siegen, Udo KelterSoftware Engineering Group, University of Siegen, Sebastian RulandTU Darmstadt, Real-time Systems Lab, Malte LochauTU Darmstadt
Pre-print Media Attached File Attached
13:40 - 15:20: Configurations and VariabilityPapers / Journal First Presentations / Research Papers at Hillcrest
Chair(s): Shin Hwei TanSouthern University of Science and Technology
13:40 - 14:00
Talk
ACTGAN: Automatic Configuration Tuning for Software Systems with Generative Adversarial Networks
Research Papers
Liang BaoSchool of Computer Science and Technology, XiDian University, Xin LiuDepartment of Computer Science, University of California, Davis, Fangzheng WangSchool of Computer Science and Technology, XiDian University, Baoyin FangSchool of Computer Science and Technology, XiDian University
14:00 - 14:20
Talk
Automated N-way Program Merging for Facilitating Family-Based Analyses of Variant-Rich Software
Journal First Presentations
Dennis ReulingSoftware Engineering Group, University of Siegen, Udo KelterSoftware Engineering Group, University of Siegen, Johannes BürdekTU Darmstadt, Real-time Systems Lab, Malte LochauTU Darmstadt
Link to publication DOI
14:20 - 14:40
Talk
V2: Fast Detection of Configuration Drift in Python
Research Papers
Eric HortonNorth Carolina State University, Chris ParninNCSU
Pre-print
14:40 - 15:00
Talk
Feature-Interaction Aware Configuration Prioritization for Configurable Code
Research Papers
Son NguyenThe University of Texas at Dallas, Hoan Anh NguyenAmazon, Ngoc TranUniversity of Texas at Dallas, Hieu TranThe University of Texas at Dallas, Tien N. NguyenUniversity of Texas at Dallas
15:00 - 15:20
Talk
Search-based test case implantation for testing untested configurations
Journal First Presentations
Dipesh PradhanSimula Research Laboratory, Norway, Shuai WangHong Kong University of Science and Technology, Tao YueNanjing University of Aeronautics and Astronautics & Simula Research Laboratory, Shaukat AliSimula Research Lab, Marius LiaaenCisco Systems
Link to publication
16:00 - 17:40: PredictionPapers / Research Papers / Journal First Presentations at Cortez 1
Chair(s): Xin XiaMonash University
16:00 - 16:20
Talk
Predicting Licenses for Changed Source Code
Research Papers
Xiaoyu LiuDepartment of Computer Science and Engineering, Southern Methodist University, Liguo HuangDept. of Computer Science, Southern Methodist University, Dallas, TX, 75205, Jidong GeState Key Laboratory for Novel Software and Technology, Nanjing University, Vincent NgHuman Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688
16:20 - 16:40
Talk
Empirical evaluation of the impact of class overlap on software defect prediction
Research Papers
Lina GongChina University of Mining and Technology, Shujuan JiangChina University of Mining and Technology, Rongcun WangChina University of Mining and Technology, Li JiangChina University of Mining and Technology
16:40 - 17:00
Talk
Combining Program Analysis and Statistical Language Model for Code Statement Completion
Research Papers
Son NguyenThe University of Texas at Dallas, Tien N. NguyenUniversity of Texas at Dallas, Yi LiNew Jersey Institute of Technology, USA, Shaohua WangNew Jersey Institute of Technology, USA
17:00 - 17:20
Talk
Balancing the trade-off between accuracy and interpretability in software defect prediction
Journal First Presentations
Toshiki MoriCorporate Software Engineering & Technology Center, Toshiba Corporation, Naoshi UchihiraSchool of Knowledge Science, Japan Advanced Institute of Science and Technology (JAIST)
Link to publication File Attached
17:20 - 17:40
Talk
Fine-grained just-in-time defect prediction
Journal First Presentations
Luca PascarellaDelft University of Technology, Fabio PalombaDepartment of Informatics, University of Zurich, Alberto BacchelliUniversity of Zurich
Link to publication
16:00 - 17:40: API and RenamingPapers / Research Papers / Journal First Presentations at Cortez 2&3
Chair(s): Massimiliano Di PentaUniversity of Sannio
16:00 - 16:20
Talk
CodeKernel: A Graph Kernel based Approach to the Selection of API Usage Examples
Research Papers
Xiaodong GuThe Hong Kong University of Science and Technology, Hongyu ZhangThe University of Newcastle, Sunghun KimHong Kong University of Science and Technology
Pre-print
16:20 - 16:40
Talk
Machine Learning Based Automated Method Name Recommendation: How Far Are We
Research Papers
Lin Jiangbeijing university of posts and telecommunication, Hui LiuBeijing Institute of Technology, He JiangSchool of Software, Dalian University of Technology
Link to publication Pre-print
16:40 - 17:00
Talk
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems
Research Papers
Daye NamCarnegie Mellon University, Amber HorvathCarnegie Mellon University, Andrew MacveanGoogle, Inc., Brad A. MyersCarnegie Mellon University, Bogdan VasilescuCarnegie Mellon University
Pre-print
17:00 - 17:20
Talk
DIRE: A Neural Approach to Decompiled Identifier Renaming
Research Papers
Jeremy LacomisCarnegie Mellon University, Pengcheng YinCarnegie Mellon University, Edward J. SchwartzCarnegie Mellon University Software Engineering Institute, Miltiadis AllamanisMicrosoft Research, Cambridge, Claire Le GouesCarnegie Mellon University, Graham NeubigCarnegie Mellon University, Bogdan VasilescuCarnegie Mellon University
Pre-print Media Attached
17:20 - 17:40
Talk
Automatic Detection and Update Suggestion for Outdated API Names in Documentation
Journal First Presentations
Seonah LeeGyeongsang National University, Rongxin WuDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Sungwon KangKorea Advanced Institute of Science and Technology
Link to publication
16:00 - 17:50: PerformancePapers / Research Papers / Demonstrations at Hillcrest
Chair(s): Tim MenziesNorth Carolina State University
16:00 - 16:20
Talk
Accurate Modeling of Performance Histories for Evolving Software Systems
Research Papers
Stefan MühlbauerBauhaus-University Weimar, Sven ApelSaarland University, Norbert SiegmundBauhaus-University Weimar
Pre-print
16:20 - 16:40
Talk
An Industrial Experience Report on Performance-Aware Refactoring on a Database-centric Web Application
Research Papers
Boyuan ChenYork University, Zhen Ming (Jack) JiangYork University, Paul MatosCopywell Inc., Michael LacariaCopywell Inc.
Authorizer link Pre-print
16:40 - 17:00
Talk
An Experience Report of Generating Load Tests Using Log-recovered Workloads at Varying Granularities of User Behaviour
Research Papers
Jinfu ChenJiangsu University, Weiyi ShangConcordia University, Canada, Ahmed E. HassanQueen's University, Yong WangAlibaba Group, Jiangbin LinAlibaba Group
Pre-print
17:00 - 17:10
Talk
How Do API Selections Affect the Runtime Performance of Data Analytics Tasks?
Research Papers
Yida TaoShenzhen University, Shan TangShenzhen University, Yepang LiuSouthern University of Science and Technology, Zhiwu XuShenzhen University, Shengchao QinUniversity of Teesside
17:10 - 17:20
Talk
Demystifying Application Performance Management Libraries for Android
Research Papers
Yutian TangThe Hong Kong Polytechnic University, Zhan XianThe Hong Kong Polytechnic University, Hao ZhouThe Hong Kong Polytechnic University, Xiapu LuoThe Hong Kong Polytechnic University, Zhou XuWuhan University, Yajin ZhouZhejiang University, Qiben YanMichigan State University
17:20 - 17:30
Demonstration
PeASS: A Tool for Identifying Performance Changes at Code Level
Demonstrations
David Georg ReicheltUniversität Leipzig, Stefan KühneUniversität Leipzig, Wilhelm HasselbringKiel University
Pre-print Media Attached File Attached
17:30 - 17:50
Talk
ReduKtor: How We Stopped Worrying About Bugs in Kotlin Compiler
Research Papers
Daniil StepanovSaint Petersburg Polytechnic University, Marat AkhinSaint Petersburg Polytechnic University / JetBrains Research, Mikhail BelyaevSaint Petersburg Polytechnic University
Pre-print

Thu 14 Nov
Times are displayed in time zone: Tijuana, Baja California change

08:30 - 08:45
Awards
Student Research Competition Awards Ceremony
Student Research Competition
08:45 - 09:00
ASE 2020 Announcement
Research Papers
09:00 - 10:00
Talk
Automated Debug & Profiling of AAA Games
Research Papers
Mathieu NayrollesUbisoft Montreal
10:00 - 10:40: Poster Session: Tool Demonstrations 3Demonstrations at Kensington Ballroom
10:00 - 10:40
Demonstration
PraPR: Practical Program Repair via Bytecode Mutation
Demonstrations
Ali GhanbariThe University of Texas at Dallas, Lingming ZhangThe University of Texas at Dallas
10:00 - 10:40
Demonstration
Kotless: a Serverless Framework for Kotlin
Demonstrations
Vladislav TankovJetBrains, ITMO University, Yaroslav GolubevJetBrains Research, ITMO University, Timofey BryksinJetBrains Research, Saint-Petersburg State University
10:00 - 10:40
Demonstration
PeASS: A Tool for Identifying Performance Changes at Code Level
Demonstrations
David Georg ReicheltUniversität Leipzig, Stefan KühneUniversität Leipzig, Wilhelm HasselbringKiel University
Pre-print Media Attached File Attached
10:00 - 10:40
Demonstration
MutAPK: Source-Codeless Mutant Generation for Android Apps
Demonstrations
Camilo Escobar-VelásquezUniversidad de los Andes, Michael Osorio-RiañoUniversidad de los Andes, Mario Linares-VásquezSystems and Computing Engineering Department , Universidad de los Andes , Bogotá, Colombia
10:00 - 10:40
Demonstration
CocoQa: Question Answering for Coding Conventions over Knowledge Graphs
Demonstrations
Tianjiao DuShanghai JiaoTong University, Junming CaoShanghai JiaoTong University, Qinyue WuShanghai JiaoTong University, Wei LiShanghai JiaoTong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yuting ChenShanghai Jiao Tong University
10:00 - 10:03
Demonstration
Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing
Demonstrations
Yuanchun LiPeking University, Ziyue YangPeking University, Yao GuoPeking University, Xiangqun ChenPeking University
10:00 - 10:40
Demonstration
Developer Reputation Estimator (DRE)
Demonstrations
Sadika AmreenUniversity of Tennessee Knoxville, Andrey KarnauchUniversity of Tennessee Knoxville, Audris MockusUniversity of Tennessee - Knoxville
10:00 - 10:40
Demonstration
NeuralVis: Visualizing and Interpreting Deep Learning Models
Demonstrations
Xufan ZhangState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Ziyue YinState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Yang FengUniversity of California, Irvine, Qingkai ShiHong Kong University of Science and Technology, Jia LiuState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Zhenyu ChenNanjing University
10:00 - 10:40
Demonstration
Visual Analytics for Concurrent Java Executions
Demonstrations
Cyrille ArthoKTH Royal Institute of Technology, Sweden, Monali PandeKTH Royal Institute of Technology, Qiyi TangUniversity of Oxford
10:00 - 10:40
Demonstration
Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs
Demonstrations
Ayesha SadiqMonash University, Li LiMonash University, Australia, Yuan-Fang LiMonash University, Ijaz AhmedUniversity of Lahore, Sea LingMonash University
10:00 - 10:40
Demonstration
SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Demonstrations
Goran PiskachevFraunhofer IEM, Lisa Nguyen Quang DoGoogle, Oshando JohnsonFraunhofer IEM, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM
Pre-print Media Attached File Attached
10:00 - 10:40
Demonstration
VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization
Demonstrations
Chijin ZhouTsinghua University, Mingzhe WangTsinghua University, Jie LiangTsinghua University, Zhe LiuNanjing University of Aeronautics and Astronautics, Chengnian SunWaterloo University, Yu JiangTsinghua University
10:40 - 12:20: ConcurrencyPapers / Research Papers / Demonstrations at Cortez 1
Chair(s): Elena ShermanBoise State University
10:40 - 11:00
Talk
MAP-Coverage: a Novel Coverage Criterion for Testing Thread-Safe Classes
Research Papers
Zan WangCollege of Intelligence and Computing, Tianjin University, Yingquan ZhaoCollege of Intelligence and Computing, Tianjin University, Shuang LiuCollege of Intelligence and Computing, Tianjin University, Jun SunSingapore Management University, Singapore, Xiang ChenSchool of Information Science and Technology, Nantong University, Huarui LinCollege of Intelligence and Computing, Tianjin University
11:00 - 11:20
Talk
Automating Non-Blocking Synchronization In Concurrent Data Abstractions
Research Papers
Jiange ZhangUniversity of Colorado Colorado Springs, Qing YiUniversity of Colorado Colorado Springs, Damian DechevUniversity of Central Florida
Pre-print
11:20 - 11:40
Talk
Automating CUDA Synchronization via Program Transformation
Research Papers
Mingyuan WuSouthern University of Science and Technology, Lingming ZhangThe University of Texas at Dallas, Cong LiuEindhoven University of Technology, Shin Hwei TanSouthern University of Science and Technology, Yuqun ZhangSouthern University of Science and Technology
11:40 - 12:00
Talk
Efficient Transaction-Based Deterministic Replay for Multi-threaded Programs
Research Papers
Ernest Bota PobeeCity University of Hong Kong, Xiupei MeiCity University of Hong Kong, Wing-Kwong ChanCity University of Hong Kong, Hong Kong
12:00 - 12:10
Demonstration
VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq
Demonstrations
Bernd FischerStellenbosch University, Salvatore La TorreUniversità degli Studi di Salerno, Gennaro ParlatoUniversity of Molise
12:10 - 12:20
Demonstration
ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities
Demonstrations
Ruijie MengUniversity of Chinese Academy of Sciences, Biyun ZhuUniversity of Chinese Academy of Sciences, Hao YunUniversity of Chinese Academy of Sciences, Haicheng LiUniversity of Chinese Academy of Sciences, Yan CaiInstitute of Software, Chinese Academy of Sciences, Zijiang YangWestern Michigan University
10:40 - 12:20: Deep ModelsPapers / Research Papers / Demonstrations at Cortez 2&3
Chair(s): Nazareno AguirreDept. of Computer Science FCEFQyN, University of Rio Cuarto
10:40 - 11:00
Talk
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement LearningACM SIGSOFT Distinguished Paper Award
Research Papers
Yan ZhengTianjin University, Xiaofei XieNanyang Technological University, Ting SuETH Zurich, Lei MaKyushu University, Jianye HaoTianjin University, Zhaopeng MengTianjin University, Yang LiuNanyang Technological University, Singapore, Ruimin ShenFuxi AI Lab in Netease, Yinfeng ChenFuxi AI Lab in Netease, Changjie FanFuxi AI Lab in Netease
Link to publication Pre-print
11:00 - 11:20
Talk
A Study of Oracle Approximations in Testing Deep Learning Libraries
Research Papers
Mahdi NejadgholiConcordia University, Jinqiu YangConcordia University, Montreal, Canada
11:20 - 11:40
Talk
Property Inference for Deep Neural Networks
Research Papers
Divya GopinathCarnegie Mellon University, Hayes ConverseThe University of Texas at Austin, Corina S. PasareanuCarnegie Mellon University Silicon Valley, NASA Ames Research Center, Ankur TalyGoogle
11:40 - 12:00
Talk
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms
Research Papers
Qianyu GuoTianjin University, Sen ChenNanyang Technological University, Singapore, Xiaofei XieNanyang Technological University, Lei MaKyushu University, Qiang HuKyushu University, Japan, Hongtao LiuTianjin University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University, Li XiaohongTianJin University
Pre-print
12:00 - 12:10
Demonstration
DeepMutation++: a Mutation Testing Framework for Deep Learning Systems
Demonstrations
Qiang HuKyushu University, Japan, Lei MaKyushu University, Xiaofei XieNanyang Technological University, Bing YuKyushu University, Japan, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University
12:10 - 12:20
Demonstration
DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks
Demonstrations
Xiaofei XieNanyang Technological University, Hongxu ChenNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University
10:40 - 12:20: Refactoring and Software ProductionPapers / Research Papers / Industry Showcase / Demonstrations at Hillcrest
Chair(s): Cyrille ArthoKTH Royal Institute of Technology, Sweden
10:40 - 11:00
Talk
RefBot: Intelligent Software Refactoring Bot
Research Papers
Vahid AlizadehUniversity of Michigan, Mohamed Amine OualiUniversity of Michigan, Marouane KessentiniUniversity of Michigan, Meriem ChaterUniversity of Michigan
11:00 - 11:20
Talk
Automated Refactoring to Reactive Programming
Research Papers
Mirko KöhlerTechnische Universität Darmstadt, Guido SalvaneschiTechnische Universität Darmstadt
11:20 - 11:40
Talk
Trusted Software Supply Chain
Industry Showcase
Kapil SingiAccenture, R.P. Jagadeesh Chandra BoseAccenture Labs, Sanjay PodderAccenture, Adam P. BurdenAccenture
11:40 - 12:00
Talk
A Journey Towards Providing Intelligence and Actionable Insights to Development Teams in Software Delivery
Industry Showcase
Vibhu Saujanya SharmaAccenture Labs, Rohit MehraAccenture Labs, India, Sanjay PodderAccenture, Adam P. BurdenAccenture
12:00 - 12:10
Demonstration
Prema: A Tool for Precise Requirements Editing, Modeling and Analysis
Demonstrations
Yihao HuangEast China Normal University, Jincao FengEast China Normal University, Hanyue ZhengEast China Normal University, Jiayi ZhuEast China Normal University, Shang WangEast China Normal University, Siyuan JiangEastern Michigan University, Weikai MiaoShanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang PuEast China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd
12:10 - 12:20
Talk
Empirical Study of Programming to an Interface
Research Papers
Benoît VerhaegheINRIA, Christopher FuhrmanÉcole de technologie supérieure, Nicolas AnquetilINRIA, Latifa GuerroujÉcole de Technologie Supérieure, Stéphane Ducasse INRIA Lille
Pre-print Media Attached
13:40 - 15:20: Program AnalysisPapers / Research Papers / Demonstrations at Cortez 1
Chair(s): Coen De RooverVrije Universiteit Brussel
13:40 - 14:00
Talk
Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation
Research Papers
Brandon PaulsenUniversity of Southern California, Chungha SungUniversity of Southern California, Peter PetersonUniversity of Minnesota Duluth, Chao WangUSC
14:00 - 14:20
Talk
Fine-grain memory object representation in symbolic execution
Research Papers
Martin NowackImperial College London
14:20 - 14:40
Talk
RENN: Efficient Reverse Execution with Neural-Network-assisted Alias Analysis
Research Papers
Dongliang MuNanjing University, Wenbo GuoThe Pennsylvania State University, Alejandro CuevasThe Pennsylvania State University, Yueqi ChenThe Pennsylvania State University, Jinxuan GaiThe Pennsylvania State University, Xinyu XingThe Pennsylvania State University, Bing MaoNanjing University, Chengyu SongUC Riverside
14:40 - 15:00
Talk
Batch Alias Analysis
Research Papers
Pre-print
15:00 - 15:10
Demonstration
Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts
Demonstrations
Mark MossbergTrail of Bits, Felipe ManzanoTrail of Bits, Eric HennenfentTrail of Bits, Alex GroceTrail of Bits, Gustavo GriecoTrail of Bits, Josselin FeistTrail of Bits, Trent BrunsonTrail of Bits, Artem DinaburgTrail of Bits
Media Attached
15:10 - 15:20
Demonstration
BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules
Demonstrations
Pavan ChittimalliTCS Research, Kritika AnandTCS Research, Shrishti PradhanTCS Research, Sayandeep MitraTCS Research, Chandan PrakashTCS Research, Rohit ShereTCS Research, Ravindra NaikTCS Research, TRDDC, India
13:40 - 15:20: Mining and Bug DetectionPapers / Demonstrations / Journal First Presentations at Cortez 2&3
Chair(s): Chanchal K. RoyUniversity of Saskatchewan
13:40 - 14:00
Talk
Automatically 'Verifying' Complex Systems through Learning, Abstraction and Refinement
Journal First Presentations
Jingyi WangNational University of Singapore, Singapore, Jun SunSingapore Management University, Singapore, Shengchao QinUniversity of Teesside, Cyrille JegourelISTD, Singapore University of Technology and Design
Link to publication
14:00 - 14:20
Talk
Interactive semi-automated specification mining for debugging: An experience report
Journal First Presentations
Mohammad Jafar MashhadiUniversity of Calgary, Taha R. SiddiquiInfoMagnetics Technologies Corp, Hadi HemmatiUniversity of Calgary, Howard W. LoewenDepartment of Electrical & Computer Engineering, University of Calgary
Link to publication
14:20 - 14:40
Talk
Improving reusability of software libraries through usage pattern mining
Journal First Presentations
Mohamed Aymen SaiedConcordia University, Ali OuniETS Montreal, University of Quebec, Houari SahraouiUniversité de Montréal, Raula Gaikovina KulaNAIST, Katsuro InoueOsaka University, David LoSingapore Management University
Link to publication
14:40 - 15:00
Talk
Rule-based specification mining leveraging learning to rank
Journal First Presentations
Zherui CaoZhejiang University, Yuan TianQueens University, Kingston, Canada, Tien-Duy B. LeSchool of Information Systems, Singapore Management University, David LoSingapore Management University
Link to publication
15:00 - 15:10
Demonstration
TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis
Demonstrations
Yuexing WangTsinghua University, Guang ChenTsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Jiaguang SunTsinghua University
15:10 - 15:20
Demonstration
Ares: Inferring Error Specifications through Static Analysis
Demonstrations
Li ChiTsinghua University, Zuxing GuSchool of Software, Tsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Hongyu ZhangThe University of Newcastle
13:40 - 15:20: Models and LogsPapers / Research Papers / Demonstrations at Hillcrest
Chair(s): Timo KehrerHumboldt-Universtität zu Berlin
13:40 - 14:00
Talk
Statistical Log Differencing
Research Papers
Lingfeng BaoInstitute of Information Engineering, Chinese Academy of Sciences, Nimrod BusanyTel Aviv University, David LoSingapore Management University, Shahar MaozTel Aviv University
Pre-print
14:00 - 14:20
Talk
Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression
Research Papers
Jinyang LiuSun Yat-Sen University, Jieming ZhuHuawei Noah's Ark Lab, Shilin HeChinese University of Hong Kong, Pinjia HeETH Zurich, Zibin ZhengSun Yat-Sen University, Michael LyuThe Chinese University of Hong Kong
14:20 - 14:40
Talk
Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling
Research Papers
Artur BoronatUniversity of Leicester
14:40 - 15:00
Talk
Size and Accuracy in Model Inference
Research Papers
Nimrod BusanyTel Aviv University, Shahar MaozTel Aviv University, Yehonatan YulazariTel Aviv University
Pre-print
15:00 - 15:10
Demonstration
PMExec: An Execution Engine of Partial UML-RT Models
Demonstrations
Mojtaba BagherzadehQueen's University, Karim JahedQueen's University, Nafiseh KahaniQueen's University, Juergen DingelQueen's University, Kingston, Ontario
Pre-print
15:10 - 15:20
Demonstration
mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines
Demonstrations
Reza AhmadiQueen's University, Karim JahedQueen's University, Juergen DingelQueen's University, Kingston, Ontario
16:00 - 17:40: Emerging DomainsPapers / Demonstrations / Journal First Presentations / Research Papers at Cortez 1
Chair(s): Joshua GarciaUniversity of California, Irvine
16:00 - 16:20
Talk
Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic Volatility
Research Papers
Jeffrey PalmerinoRochester Institute of Technology, Qi YuRochester Institute of Technology, Travis Desell University of North Dakota, Daniel KrutzRochester Institute of Technology
Pre-print
16:20 - 16:40
Talk
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Research Papers
Yuqi ChenSingapore University of Technology and Design, Singapore, Chris PoskittSingapore University of Technology and Design, Jun SunSingapore Management University, Singapore, Sridhar AdepuSingapore University of Technology and Design, Singapore, Fan ZhangZhejiang University, Zhejiang Lab, and Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China
DOI Pre-print File Attached
16:40 - 17:00
Talk
Uncertainty-wise Test Case Generation and Minimization for Cyber-Physical Systems
Journal First Presentations
Man ZhangKristiania University, Shaukat AliSimula Research Lab, Tao YueNanjing University of Aeronautics and Astronautics & Simula Research Laboratory
Link to publication
17:00 - 17:20
Talk
Finding Trends in Software Research
Journal First Presentations
George MathewDepartment of Computer Science, North Carolina State University, Amritanshu AgrawalWayfair, Tim MenziesNorth Carolina State University
Link to publication
17:20 - 17:30
Demonstration
XRaSE: Towards Virtually Tangible Software using Augmented Reality
Demonstrations
Rohit MehraAccenture Labs, India, Vibhu Saujanya SharmaAccenture Labs, Vikrant KaulgudAccenture Labs, India, Sanjay PodderAccenture
17:30 - 17:40
Demonstration
MuSC: A Tool for Mutation Testing of Ethereum Smart Contract
Demonstrations
Zixin LiNanjing University, Haoran WuState Key Laboratory for Novel Software Technology, Nanjing University, Jiehui XuNanjing University, Xingya WangState Key Laboratory for Novel Software Technology, Nanjing University, Lingming ZhangThe University of Texas at Dallas, Zhenyu ChenNanjing University
16:00 - 17:40: Untangling and MergingPapers / Research Papers at Cortez 2&3
Chair(s): Iftekhar AhmedUniversity of California at Irvine, USA
16:00 - 16:20
Talk
The Impact of Structure on Software Merging: Semistructured versus Structured Merge
Research Papers
Guilherme CavalcantiFederal University of Pernambuco, Brazil, Paulo BorbaFederal University of Pernambuco, Brazil, Georg SeibtUniversity of Passau, Sven ApelSaarland University
Pre-print
16:20 - 16:40
Talk
Semistructured Merge in JavaScript Systems
Research Papers
Alberto Trindade TavaresFederal University of Pernambuco, Paulo BorbaFederal University of Pernambuco, Brazil, Guilherme CavalcantiFederal University of Pernambuco, Brazil, Sergio SoaresFederal University of Pernambuco
Pre-print
16:40 - 17:00
Talk
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation
Research Papers
Kawser NafiUniversity of Saskatchewan, Tonny Shekha KarUniversity of Saskatchewan, Canada, Banani RoyUniversity of Saskatchewan, Chanchal K. RoyUniversity of Saskatchewan, Kevin SchneiderUniversity of Saskatchewan
17:00 - 17:20
Talk
B2SFinder: Detecting Open-Source Software Reuse in COTS Software
Research Papers
Muyue FengInstitute of Information Engineering, Chinese Academy of Sciences, Zimu YuanInstitute of Information Engineering, Chinese Academy of Sciences, Feng LiInstitute of Computing Technology at Chinese Academy of Sciences, China, Gu BanInstitute of Information Engineering, Chinese Academy of Sciences, Yang XiaoInstitute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, Shiyang WangInstitute of Information Engineering, Chinese Academy of Sciences, Qian TangInstitute of Information Engineering, Chinese Academy of Sciences, He SuInstitute of Information Engineering, Chinese Academy of Sciences, Chendong YuUniversity of Chinese Academy of Sciences, Jiahuan XuInstitute of Information Engineering, Chinese Academy of Sciences, Aihua PiaoInstitute of Information Engineering, Chinese Academy of Sciences, Jingling XueUNSW Sydney, Wei HuoInstitute of Information Engineering, Chinese Academy of Sciences
17:20 - 17:40
Talk
CoRA: Decomposing and Describing Tangled Code Changes for Reviewer
Research Papers
Min WangPeking University, Zeqi LinMicrosoft Research, China, Yanzhen ZouPeking University, Bing XiePeking University
16:00 - 17:40: Software DevelopmentPapers / Research Papers / Journal First Presentations / Industry Showcase / Demonstrations at Hillcrest
Chair(s): Hitesh SajnaniMicrosoft
16:00 - 16:20
Talk
What is Wrong with Topic Modeling? (and How to Fix it Using Search-based Software Engineering)
Journal First Presentations
Amritanshu AgrawalWayfair, Wei FuDepartment of Computer Science, North Carolina State University, Tim MenziesNorth Carolina State University
Link to publication
16:20 - 16:40
Talk
Cautious Adaptation of Defiant Components
Research Papers
Paulo MaiaState University of Ceará, Lucas VieiraState University of Ceará, Matheus ChagasState University of Ceará, Yijun YuThe Open University, UK, Andrea ZismanThe Open University, Bashar NuseibehThe Open University (UK) & Lero (Ireland)
16:40 - 17:00
Talk
Better Development of Safety Critical Systems:Chinese High Speed Railway System Development Experience Report
Industry Showcase
Zhiwei WuEast China Normal University, Jing LiuEast China Normal University, Xiang ChenCASCO Signal Ltd.
17:00 - 17:20
Talk
Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation
Research Papers
Qiong FengDrexel University, Yuanfang Cai Drexel University, Rick KazmanUniversity of Hawai‘i at Mānoa, Di CuiXi'an Jiaotong University, Ting LiuXi'an Jiaotong University, Hongzhou FangDrexel University
17:20 - 17:30
Talk
Automated Trainability Evaluation for Smart Software Functions
Research Papers
Ilias GerostathopoulosTechnical University of Munich, Stefan KugeleTechnical University of Munich, Christoph SeglerBMW Group Research, New Technologies, Innovations, Tomas BuresCharles University, Czech Republic, Alois KnollTechnical University of Munich
Pre-print
17:30 - 17:40
Demonstration
Lancer: Your Code Tell Me What You Need
Demonstrations
Shufan ZhouSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University

Call for Papers

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2019 invites high quality contributions describing significant, original, and unpublished results.

Solicited topics include, but are not limited to:

  • Automated reasoning techniques
  • Component-based service-oriented systems
  • Cloud computing
  • Computer-supported cooperative work
  • Configuration management
  • Data mining for software engineering
  • Domain modeling and meta-modeling
  • Empirical software engineering
  • Human-computer interaction
  • Knowledge acquisition and management
  • Mobile app development
  • Maintenance and evolution
  • Model-driven development
  • Program synthesis & transformations, automated defect repair
  • Program comprehension
  • Reverse engineering and re-engineering
  • Recommender systems for software engineering
  • Requirements engineering
  • Specification languages
  • Software analysis
  • Software architecture and design
  • Software product line engineering
  • Software visualization
  • Software security and trust; data privacy
  • Testing, verification, and validation

Three categories of submissions are solicited:

  • Technical Research Papers should describe innovative research in automating software development activities or automated support to users engaged in such activities. They should describe a novel contribution to the field and should carefully support claims of novelty with citations to the relevant literature. Where a submission builds upon previous work of the author(s), the novelty of the new contribution must be clearly described with respect to the previous work but the author identity should not be revealed, i.e., prior work should be referenced in the third person, to reflect the double-blind review policy. Papers should also clearly discuss how the results were validated.

  • Experience Papers should describe a significant experience in applying automated software engineering technology and should carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of automated software engineering.

  • New Ideas Papers should describe novel research directions in automating software development activities or automated support to users engaged in such activities. New ideas submissions are intended to describe well-defined research ideas that are at an early stage of investigation and not fully validated, but are argued to be plausible.

SUBMISSION

Abstracts and papers must be submitted electronically through the ASE 2019 HotCRP submission site.

All submissions must be in PDF format and conform, at time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option).

Papers submitted to ASE 2019 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2019. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.

To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences, affiliated with ACM or IEEE, with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.

Technical Research Papers and Experience Papers must not exceed 10 pages (including figures) plus up to 2 pages that contain ONLY references. Exceeding this limit will be grounds for rejection without review. Experience papers should contain the words “experience paper” in the abstract to ensure that they are evaluated in the right category.

New Ideas Papers must not exceed 4 pages (including figures AND references).

Supplementary material can be uploaded via the HotCRP site, but PC members have no obligation to look at the supplementary material.

ASE 2019 will again pursue a double-blind review process. If you have any questions, please see FAQs and/or contact the PC chairs at ase19-chairs@lip6.fr. Authors are encouraged to double check the conflicts of interest on their papers in HotCRP shortly after the submission deadline.

All submissions must be in English.

Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.

The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs at ase19-chairs@lip6.fr.

ACCEPTED PAPERS

We strongly encourage authors of accepted papers to archive the research artifacts, including code and data, associated with their ASE papers. Software Heritage (presented in a keynote at ASE 2018) requires only providing a URL to an existing archive: https://www.softwareheritage.org/2019/08/05/saving-and-referencing-research-software-in-software-heritage/ Other often used solutions, focusing on data, include Figshare (https://figshare.com/) and Zenodo (https://zenodo.org/).

For example, here is one webpage that describes how to release the data: https://ineed.coffee/5205/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance/

Accepted Papers

Title
A Qualitative Analysis of Android Taint-Analysis Results
Research Papers
Pre-print File Attached
A Study of Oracle Approximations in Testing Deep Learning Libraries
Research Papers
ACTGAN: Automatic Configuration Tuning for Software Systems with Generative Adversarial Networks
Research Papers
Accurate Modeling of Performance Histories for Evolving Software Systems
Research Papers
Pre-print
Accurate String Constraints Solution Counting with Weighted Automata
Research Papers
Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation
Research Papers
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms
Research Papers
Pre-print
An Experience Report of Generating Load Tests Using Log-recovered Workloads at Varying Granularities of User Behaviour
Research Papers
Pre-print
An Industrial Experience Report on Performance-Aware Refactoring on a Database-centric Web Application
Research Papers
Authorizer link Pre-print
Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models
Research Papers
Assessing the Generalizability of code2vec Token Embeddings
Research Papers
Pre-print
AutoFocus: Interpreting Attention-based Neural Networks by Code Perturbation
Research Papers
Pre-print
Automated Refactoring to Reactive Programming
Research Papers
Automated Trainability Evaluation for Smart Software Functions
Research Papers
Pre-print
Automatic Generation of Pull Request DescriptionsACM SIGSOFT Distinguished Paper Award
Research Papers
Pre-print
Automatic Self-Validation for Code Coverage Profilers
Research Papers
Pre-print
Automating App Review Response Generation
Research Papers
Pre-print
Automating CUDA Synchronization via Program Transformation
Research Papers
Automating Non-Blocking Synchronization In Concurrent Data Abstractions
Research Papers
Pre-print
B2SFinder: Detecting Open-Source Software Reuse in COTS Software
Research Papers
Batch Alias Analysis
Research Papers
Pre-print
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation
Research Papers
Cautious Adaptation of Defiant Components
Research Papers
Characterizing Android App Signing Issues
Research Papers
CoRA: Decomposing and Describing Tangled Code Changes for Reviewer
Research Papers
Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling
Research Papers
CodeKernel: A Graph Kernel based Approach to the Selection of API Usage Examples
Research Papers
Pre-print
Combining Program Analysis and Statistical Language Model for Code Statement Completion
Research Papers
Combining Spectrum-Based Fault Localization and Statistical Debugging: An Empirical Study
Research Papers
Pre-print
Continuous Incident Triage for Large-Scale Online Service Systems
Research Papers
DIRE: A Neural Approach to Decompiled Identifier Renaming
Research Papers
Pre-print Media Attached
DaPanda: Detecting Aggressive Push Notification in Android Apps
Research Papers
Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation
Research Papers
Demystifying Application Performance Management Libraries for Android
Research Papers
Detecting Error-Handling Bugs without Error Specification Input
Research Papers
Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites
Research Papers
Pre-print
Efficient Test Generation Guided by Field Coverage Criteria
Research Papers
Efficient Transaction-Based Deterministic Replay for Multi-threaded Programs
Research Papers
Emotions Extracted from Text vs. True Emotions –An Empirical Evaluation in SE Context
Research Papers
Empirical Study of Programming to an Interface
Research Papers
Pre-print Media Attached
Empirical evaluation of the impact of class overlap on software defect prediction
Research Papers
Experience Paper: Search-based Testing in Automated Driving Control ApplicationsACM SIGSOFT Distinguished Paper Award
Research Papers
Feature-Interaction Aware Configuration Prioritization for Configurable Code
Research Papers
Fine-grain memory object representation in symbolic execution
Research Papers
Get rid of inline assembly through verification-oriented lifting
Research Papers
DOI Pre-print
Goal-Driven Exploration for Android Applications
Research Papers
Pre-print
Grading-Based Test Suite Augmentation
Research Papers
History-Guided Configuration Diversification for Compiler Test-Program GenerationACM SIGSOFT Distinguished Paper Award
Research Papers
How Do API Selections Affect the Runtime Performance of Data Analytics Tasks?
Research Papers
Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic Volatility
Research Papers
Pre-print
InFix: Automatically Repairing Novice Program Inputs
Research Papers
Pre-print
Inferring Program Transformations From Singular Examples via Big Code
Research Papers
Link to publication Pre-print
Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets
Research Papers
Pre-print
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Research Papers
DOI Pre-print File Attached
Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression
Research Papers
MAP-Coverage: a Novel Coverage Criterion for Testing Thread-Safe Classes
Research Papers
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems
Research Papers
Pre-print
Machine Learning Based Automated Method Name Recommendation: How Far Are We
Research Papers
Link to publication Pre-print
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Research Papers
Pre-print
Model checking embedded control software using OS-in-the-loop CEGAR
Research Papers
Pre-print
Multi-Modal Attention Network Learning for Semantic Source Code Retrieval
Research Papers
Mutation Analysis for Coq
Research Papers
OAuthLint: An Empirical Study on OAuth Bugs in Android Applications
Research Papers
Pre-print
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint AnalysisACM SIGSOFT Distinguished Paper Award
Research Papers
Predicting Licenses for Changed Source Code
Research Papers
Property Inference for Deep Neural Networks
Research Papers
RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation
Research Papers
RENN: Efficient Reverse Execution with Neural-Network-assisted Alias Analysis
Research Papers
Re-factoring based Program Repair applied to Programming Assignments
Research Papers
Pre-print
ReduKtor: How We Stopped Worrying About Bugs in Kotlin Compiler
Research Papers
Pre-print
RefBot: Intelligent Software Refactoring Bot
Research Papers
Regexes are Hard: Decision-making, Difficulties, and Risks in Programming Regular ExpressionsACM SIGSOFT Distinguished Paper Award
Research Papers
Pre-print File Attached
Root Cause Localization for Unreproducible Builds via Causality Analysis over System Call Tracing
Research Papers
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Research Papers
Pre-print File Attached
SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs
Research Papers
Pre-print
Semistructured Merge in JavaScript Systems
Research Papers
Pre-print
Size and Accuracy in Model Inference
Research Papers
Pre-print
Statistical Log Differencing
Research Papers
Pre-print
Subformula Caching for Model Counting and Quantitative Program Analysis
Research Papers
Systematically Covering Input Structure
Research Papers
Pre-print
Targeted Example Generation for Compilation Errors
Research Papers
Link to publication Pre-print
Test Migration Between Mobile Apps with Similar Functionality
Research Papers
Test Transfer Across Mobile Apps Through Semantic Mapping
Research Papers
Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study
Research Papers
Pre-print File Attached
The Impact of Structure on Software Merging: Semistructured versus Structured Merge
Research Papers
Pre-print
Understanding Automatically-Generated Patches Through Symbolic Invariant Differences
Research Papers
Pre-print
Understanding Exception-Related Bugs in Large-Scale Cloud Systems
Research Papers
Pre-print Media Attached
V2: Fast Detection of Configuration Drift in Python
Research Papers
Pre-print
Verifying Arithmetic in Cryptographic C Programs
Research Papers
Pre-print
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement LearningACM SIGSOFT Distinguished Paper Award
Research Papers
Link to publication Pre-print
iFeedback: Exploiting User Feedback for Real-time Issue Detection in Large-Scale Online Service Systems
Research Papers

If you have questions not answered below, please contact the program chairs at ase19-chairs@lip6.fr

Q: Why Double Blind?

There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. For more information on motivation for double-blind reviewing, see Claire Le Goues’ very well argued, referenced, and evidenced blog posting in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.

Q: How to prepare your paper for double-blind reviewing?

You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:

  • Omit all authors’ names and affiliations from the title page. If you have acknowledgements, do not mention any names or organizations.

  • Refer to your own work in the third person. You should not change the names of your own previously published tools, approaches, or systems, because this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper.

  • If possible, do not rely on supplementary material (your web site, your GitHub repository, your YouTube channel, a companion technical report or thesis) in the paper. Such material might reveal author identities. It is possible to post a link to an anonymous GitHub repository, but the repository should be checked carefully for any information that could reveal author identity, and it could be helpful to warn the reader that accessing the repository could reveal author identity. It is also possible to submit supplementary material with the paper, but again it is necessary to check the material carefully for anything that can reveal author identity.

Q: Can I disseminate non-blinded version of my submitted work by discussing it with colleagues, giving talks, publishing it at arXiv, etc.?

You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you should not discuss your work with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post the submitted work on arXiv or a similar site just shortly before submitting to the conference. One option is to make a tech report at your institution, which allows someone to cite the work, if need be, like arXiv, but doesn’t have the same degree of visibility.

Q: I published a previous version of my work on arXiv or as a tech report at my institution. Do I need to cite it, and if so how?

A paper on arXiv or a tech report is not a publication. If there is a need to cite the old version because it contains some important information that is not in the submission, then the previous version can be cited anonymously, if a normal citation would reveal the names of the authors. If the submission completely subsumes the previous version, then there is no need to cite the previous version at all.

Q: I previously published an earlier version of this work elsewhere than arXiv. What should I do about citing that previous work?

If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors. This would include posters, but only if the poster is accompanied by a paper in the conference proceedings. Posters that are not represented in the proceedings can be ignored.

Q: What about a PhD or master’s thesis?

It’s perfectly fine to publish work arising from a PhD or master’s degree, and there’s no need to cite it in a submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution.

In general, the guideline is that the author’s job is to ensure that the submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identities, so they will likely not be searching the web to check whether there is a tech report or other unpublished material related to this work.

This FAQ is based on guidelines for double-blind reviewing from ASE 2018 (http://www.ase2018.com/?p=author_instructions) and ICSE 2019 (https://2019.icse-conferences.org/track/icse-2019-Submitting-to-ICSE2019-Q-A).