default search action
33rd ASE 2018: Montpellier, France
- Marianne Huchard, Christian Kästner, Gordon Fraser:
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, ASE 2018, Montpellier, France, September 3-7, 2018. ACM 2018
Keynotes
- Roberto Di Cosmo:
Software heritage: collecting, preserving, and sharing all our source code (keynote). 1-2 - Jane Cleland-Huang:
Automated requirements engineering challenges with examples from small unmanned aerial systems (keynote). 3 - Lauren Herckis:
Implementation science for software engineering: bridging the gap between research and practice (keynote). 4 - Gail C. Murphy:
The need for context in software engineering (IEEE CS Harlan Mills award keynote). 5
Performance
- Sarra Habchi, Xavier Blanc, Romain Rouvoy:
On adopting linters to deal with performance concerns in Android apps. 6-16 - Xue Han, Tingting Yu, David Lo:
PerfLearner: learning from bug reports to understand and generate performance test frames. 17-28 - Liang Bao, Xin Liu, Ziheng Xu, Baoyin Fang:
AutoConfig: automatic configuration tuning for distributed message systems. 29-40 - Andrew Habib, Michael Pradel:
Is this class thread-safe? inferring documentation using graph-based learning. 41-52
Testing Studies
- Michael Hilton, Jonathan Bell, Darko Marinov:
A large-scale study of test coverage evolution. 53-63 - Valerio Terragni, Mauro Pezzè:
Effectiveness and challenges in generating concurrent tests for thread-safe classes. 64-75
Build and Test Automation
- Gabriël Konat, Sebastian Erdweg, Eelco Visser:
Scalable incremental building with dynamic task dependencies. 76-86 - Keheliya Gallaba, Christian Macho, Martin Pinzger, Shane McIntosh:
Noise and heterogeneity in historical build data: an empirical study of Travis CI. 87-97
Quality Assurance for Machine Learning Techniques
- Sakshi Udeshi, Pryanshu Arora, Sudipta Chattopadhyay:
Automated directed fairness testing. 98-108 - Youcheng Sun, Min Wu, Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska, Daniel Kroening:
Concolic testing for deep neural networks. 109-119 - Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepGauge: multi-granularity testing criteria for deep learning systems. 120-131 - Mengshi Zhang, Yuqun Zhang, Lingming Zhang, Cong Liu, Sarfraz Khurshid:
DeepRoad: GAN-based metamorphic testing and input validation framework for autonomous driving systems. 132-142
Variability
- Raja Ben Abdessalem, Annibale Panichella, Shiva Nejati, Lionel C. Briand, Thomas Stifter:
Testing autonomous cars for feature interaction failures using many-objective search. 143-154 - Mukelabai Mukelabai, Damir Nesic, Salome Maro, Thorsten Berger, Jan-Philipp Steghöfer:
Tackling combinatorial explosion: a study of industrial needs and practices for analyzing highly configurable systems. 155-166 - Dongjie He, Lian Li, Lei Wang, Hengjie Zheng, Guangwei Li, Jingling Xue:
Understanding and detecting evolution-induced compatibility issues in Android apps. 167-177
Mining and Crowd Sourcing
- Pinjia He, Zhuangbin Chen, Shilin He, Michael R. Lyu:
Characterizing the natural language descriptions in software logging statements. 178-189 - John-Paul Ore, Sebastian G. Elbaum, Carrick Detweiler, Lambros Karkazis:
Assessing the type annotation burden. 190-201 - Vladimir Kovalenko, Fabio Palomba, Alberto Bacchelli:
Mining file histories: should we consider branches? 202-213 - Yi Huang, Chunyang Chen, Zhenchang Xing, Tian Lin, Yang Liu:
Tell them apart: distilling technology differences from crowd-scale comparison discussions. 214-224
Security
- Yuju Shen, Yanyan Jiang, Chang Xu, Ping Yu, Xiaoxing Ma, Jian Lu:
ReScue: crafting regular expression DoS attacks. 225-235 - Jie Liu, Diyu Wu, Jingling Xue:
TDroid: exposing app switching attacks in Android with control flow specialization. 236-247 - Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand:
Model-driven run-time enforcement of complex role-based access control policies. 248-258 - Bo Jiang, Ye Liu, W. K. Chan:
ContractFuzzer: fuzzing smart contracts for vulnerability detection. 259-269
Developer Tools
- Steven P. Reiss, Qi Xin, Jeff Huang:
SEEDE: simultaneous execution and editing in a development environment. 270-281 - Xiaoyu Liu, LiGuo Huang, Vincent Ng:
Effective API recommendation without historical software repositories. 282-292 - Qiao Huang, Xin Xia, Zhenchang Xing, David Lo, Xinyu Wang:
API method recommendation without worrying about the task-API knowledge gap. 293-304 - Boyuan Chen, Jian Song, Peng Xu, Xing Hu, Zhen Ming (Jack) Jiang:
An automated approach to estimating code coverage measures via execution logs. 305-316
Static Analysis
- Andrew Habib, Michael Pradel:
How many of all bugs do we find? a study of static bug detectors. 317-328 - Hashim Sharif, Muhammad Abubakar, Ashish Gehani, Fareed Zaffar:
TRIMMER: application specialization for code debloating. 329-339 - Dominik Helm, Florian Kübler, Michael Eichberg, Michael Reif, Mira Mezini:
A unified lattice model and framework for purity analyses. 340-350
Verification 1
- Jianhui Chen, Fei He:
Control flow-guided SMT solving for program verification. 351-361 - Yutaka Nagashima, Yilun He:
PaMpeR: proof method recommendation system for Isabelle/HOL. 362-372
Maintenance and Machine Learning
- Zhongxin Liu, Xin Xia, Ahmed E. Hassan, David Lo, Zhenchang Xing, Xinyu Wang:
Neural-machine-translation-based commit message generation: how far are we? 373-384 - Hui Liu, Zhifeng Xu, Yanzhen Zou:
Deep learning based feature envy detection. 385-396 - Yao Wan, Zhou Zhao, Min Yang, Guandong Xu, Haochao Ying, Jian Wu, Philip S. Yu:
Improving automatic source code summarization via deep reinforcement learning. 397-407
Symbolic Execution
- Sooyoung Cha, Seonho Lee, Hakjoo Oh:
Template-guided concolic testing via online learning. 408-418 - Xiang Gao, Shin Hwei Tan, Zhen Dong, Abhik Roychoudhury:
Android testing via synthetic symbolic execution. 419-429 - Oscar Soria Dustmann, Klaus Wehrle, Cristian Cadar:
PARTI: a multi-interval theory solver for symbolic execution. 430-440
Maintenance
- Federico Mora, Yi Li, Julia Rubin, Marsha Chechik:
Client-specific equivalence checking. 441-451 - Nipun Arora, Jonathan Bell, Franjo Ivancic, Gail E. Kaiser, Baishakhi Ray:
Replay without recording of production bugs for service oriented applications. 452-463 - Vahid Alizadeh, Marouane Kessentini:
Reducing interactive refactoring effort via clustering-based multi-objective search. 464-474
Software Quality
- Caroline Lemieux, Koushik Sen:
FairFuzz: a targeted mutation strategy for increasing greybox fuzz testing coverage. 475-485 - Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu:
Efficiently manifesting asynchronous programming errors in Android apps. 486-497 - Wensheng Dou, Shi Han, Liang Xu, Dongmei Zhang, Jun Wei:
Expandable group identification in spreadsheets. 498-508 - Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai, Haijun Wang, Jin Song Dong:
Break the dead end of dynamic slicing: localizing data and control omission bug. 509-519
Architecture and Requirements
- Renzo Degiovanni, Facundo Molina, Germán Regis, Nazareno Aguirre:
A genetic algorithm for goal-conflict identification. 520-531
Mobile Analysis
- Huaxun Huang, Lili Wei, Yepang Liu, Shing-Chi Cheung:
Understanding and detecting callback compatibility issues for Android applications. 532-542 - Kevin Moran, Cody Watson, John Hoskins, George Purnell, Denys Poshyvanyk:
Detecting and summarizing GUI changes in evolving mobile apps. 543-553 - Yixue Zhao, Paul Wat, Marcelo Schmitt Laser, Nenad Medvidovic:
Empirically assessing opportunities for prefetching and caching in mobile apps. 554-564 - Benno Stein, Lazaro Clapp, Manu Sridharan, Bor-Yuh Evan Chang:
Safe stream-based programming with refinement types. 565-576
Repair
- Kaiyuan Wang, Allison Sullivan, Sarfraz Khurshid:
Automated model repair for Alloy. 577-588 - Huarui Lin, Zan Wang, Shuang Liu, Jun Sun, Dongdi Zhang, Guangning Wei:
PFix: fixing concurrency bugs based on memory access patterns. 589-600 - Mohammad Bajammal, Davood Mazinanian, Ali Mesbah:
Generating reusable web components from mockups. 601-611 - Rijnard van Tonder, John Kotheimer, Claire Le Goues:
Semantic crash bucketing. 612-622
Verification 2
- Hung-En Wang, Shih-Yu Chen, Fang Yu, Jie-Hong R. Jiang:
A symbolic model checking approach to the analysis of string and length constraints. 623-633 - Dirk Beyer, Karlheinz Friedberger:
Domain-independent multi-threaded software model checking. 634-644 - Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Scheduling constraint based abstraction refinement for weak memory models. 645-655
Code Differencing and Merging
- Chungha Sung, Shuvendu K. Lahiri, Constantin Enea, Chao Wang:
Datalog-based scalable semantic diffing of concurrent programs. 656-666 - Bingchang Liu, Wei Huo, Chao Zhang, Wenchao Li, Feng Li, Aihua Piao, Wei Zou:
αDiff: cross-version binary code similarity detection with DNN. 667-678 - Kaifeng Huang, Bihuan Chen, Xin Peng, Daihong Zhou, Ying Wang, Yang Liu, Wenyun Zhao:
ClDiff: generating concise linked code differences. 679-690
Mobile Security
- Jiwei Yan, Xi Deng, Ping Wang, Tianyong Wu, Jun Yan, Jian Zhang:
Characterizing and identifying misexposed activities in Android applications. 691-701 - Jiajun Hu, Lili Wei, Yepang Liu, Shing-Chi Cheung, Huaxun Huang:
A tale of two cities: how WebView induces bugs to Android applications. 702-713 - Zhenhao Tang, Juan Zhai, Minxue Pan, Yousra Aafer, Shiqing Ma, Xiangyu Zhang, Jianhua Zhao:
Dual-force: understanding WebView malware via cross-language forced execution. 714-725 - Mahmoud Hammad, Joshua Garcia, Sam Malek:
Self-protection of Android systems from inter-component communication attacks. 726-737
Experience Papers
- Wenyu Wang, Dengfeng Li, Wei Yang, Yurui Cao, Zhenwen Zhang, Yuetang Deng, Tao Xie:
An empirical study of Android test generation tools in industrial cases. 738-748 - Davrondzhon Gafurov, Arne Erik Hurum, Martin Markman:
Achieving test automation with testers without coding skills: an industrial report. 749-756 - Mikaela Cashman, Myra B. Cohen, Priya Ranjan, Robert W. Cottingham:
Navigating the maze: the impact of configurability in bioinformatics software. 757-767 - Alexandra Bugariu, Valentin Wüstholz, Maria Christakis, Peter Müller:
Automatically testing implementations of numerical abstract domains. 768-778 - Ran Mo, Will Snipes, Yuanfang Cai, Srini Ramaswamy, Rick Kazman, Martin Naedele:
Experiences applying automated architecture analysis tool suites. 779-789
New Ideas Papers
- Carmine Vassallo, Fabio Palomba, Alberto Bacchelli, Harald C. Gall:
Continuous code quality: are we (really) doing that? 790-795 - Foyzul Hassan, Rodney Rodriguez, Xiaoyin Wang:
RUDSEA: recommending updates of Dockerfiles via software environment analysis. 796-801 - Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Wenhai Li, Chao Ji, Dan Ding:
Delta debugging microservice systems. 802-807 - Luting Ye, Hailong Sun, Xu Wang, Jiaruijue Wang:
Personalized teammate recommendation for crowdsourced software developers. 808-813 - Han Liu, Chao Liu, Wenqi Zhao, Yu Jiang, Jiaguang Sun:
S-gram: towards semantic-aware security auditing for Ethereum smart contracts. 814-819 - Jianghao Wang, Hamid Bagheri, Myra B. Cohen:
An evolutionary approach for analyzing Alloy specifications. 820-825 - Qingying Chen, Minghui Zhou:
A neural framework for retrieval and summarization of source code. 826-831 - Michele Tufano, Cody Watson, Gabriele Bavota, Massimiliano Di Penta, Martin White, Denys Poshyvanyk:
An empirical investigation into learning bug-fixing patches in the wild via neural machine translation. 832-837 - Jianxiong Gao, Steven S. Lumetta:
Loop path reduction by state pruning. 838-843 - Yu Qu, Ting Liu, Jianlei Chi, Yangxu Jin, Di Cui, Ancheng He, Qinghua Zheng:
node2defect: using network embedding to improve software defect prediction. 844-849 - Manasi Patwardhan, Abhishek Sainani, Richa Sharma, Shirish Karande, Smita Ghaisas:
Towards automating disambiguation of regulations: using the wisdom of crowds. 850-855
Tool Demonstrations
- Rui Pereira, Pedro Simão, Jácome Cunha, João Saraiva:
jStanley: placing a green thumb on Java collections. 856-859 - Farah Hariri, August Shi:
SRCIROR: a toolset for mutation testing of C source code and LLVM intermediate representation. 860-863 - Alim Ozdemir, Ayse Tosun, Hakan Erdogmus, Rui Abreu:
Lightweight source code monitoring with Triggr. 864-867 - Simone Scalabrino, Giovanni Grano, Dario Di Nucci, Michele Guerra, Andrea De Lucia, Harald C. Gall, Rocco Oliveto:
OCELOT: a search-based test-data generation tool for C. 868-871 - Julián Grigera, Juan Cruz Gardey, Alejandra Garrido, Gustavo Rossi:
Live versioning of web applications through refactoring. 872-875 - Andrea Janes, Michael Mairegger, Barbara Russo:
code_call_lens: raising the developer awareness of critical code. 876-879 - Gharib Gharibi, Rashmi Tripathi, Yugyung Lee:
Code2graph: automatic generation of static call graphs for Python source code. 880-883 - Julien Brunel, David Chemouil, Alcino Cunha, Nuno Macedo:
The electrum analyzer: model checking relational first-order temporal specifications. 884-887 - Mikhail Y. R. Gadelha, Felipe R. Monteiro, Jeremy Morse, Lucas C. Cordeiro, Bernd Fischer, Denis A. Nicole:
ESBMC 5.0: an industrial-strength C model checker. 888-891 - Jialun Cao, Yongjian Li, Jun Pang:
L-CMP: an automatic learning-based parameterized verification tool. 892-895 - Jian Gao, Xin Yang, Ying Fu, Yu Jiang, Jiaguang Sun:
VulSeeker: a semantic learning based vulnerability seeker for cross-platform binary. 896-899 - Dirk Beyer, Thomas Lemberger:
CPA-SymExec: efficient symbolic execution in CPAchecker. 900-903 - Chungha Sung, Brandon Paulsen, Chao Wang:
CANAL: a cache timing analysis framework via LLVM transformation. 904-907 - Oscar Luis Vera-Pérez, Martin Monperrus, Benoit Baudry:
Descartes: a PITest engine to detect pseudo-tested methods: tool demonstration. 908-911 - Mohammad Roohitavaf, Sandeep S. Kulkarni:
DKVF: a framework for rapid prototyping and evaluating distributed key-value stores. 912-915 - Nataniel P. Borges Jr., Jenny Hotzkow, Andreas Zeller:
DroidMate-2: a platform for Android test generation. 916-919
Session 1
- Philipp Haindl:
Assessing and evaluating functional suitability of software. 920-923
Session 2
- Thomas Krismayer:
Automatic mining of constraints for monitoring systems of systems. 924-927 - Rokiatou Diarra:
Towards automatic restrictification of CUDA kernel arguments. 928-931 - Florian Galinier:
A DSL for requirements in the context of a seamless approach. 932-935
Session 3
- Luca Traini:
A multi-objective framework for effective performance fault injection in distributed systems. 936-939 - David Sferruzza:
Top-down model-driven engineering of web services from extended OpenAPI models. 940-943 - Yannic Noller:
Differential program analysis with fuzzing and symbolic execution. 944-947 - Julien Delplanque:
Software engineering techniques applied to relational databases. 948-951
Journal-First Papers
- Nada Almasri, Luay Tahat, Bogdan Korel:
Automatically quantifying the impact of a change in systems (journal-first abstract). 952 - Davide Falessi, Massimiliano Di Penta, Gerardo Canfora, Giovanni Cantone:
Estimating the number of remaining links in traceability recovery (journal-first abstract). 953 - Felipe R. Monteiro, Mário A. P. Garcia, Lucas C. Cordeiro, Eddie Batista de Lima Filho:
Bounded model checking of C++ programs based on the Qt cross-platform framework (journal-first abstract). 954 - Paola R. G. Accioly, Paulo Borba, Guilherme Cavalcanti:
Understanding Semi-structured merge conflict characteristics in open-source Java projects (journal-first abstract). 955
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.