ASE 2018
2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE 2018)
Powered by
Conference Publishing Consulting

2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE 2018), September 3–7, 2018, Montpellier, France

ASE 2018 – Advance Table of Contents

Contents - Abstracts - Authors
Twitter: https://twitter.com/ASEConf2018

Frontmatter

Title Page
Message from the Chairs
Committees
Sponsors

Technical Research Papers

Towards Automating Disambiguation of Regulations: Using the Wisdom of Crowds
Manasi Patwardhan, Abhishek Sanani, Richa Sharma, Shirish karande, and Smita Ghaisas
(Tata Consultancy Services, India)
Article Search
S-gram: Towards Semantic-Aware Security Auditing for Ethereum Smart Contracts
Han Liu, Chao Liu, Wenqi Zhao, Yu Jiang, and Jiaguang Sun
(Tsinghua University, China; Peking University, China; Ant Financial, n.n.)
Article Search
Continuous Code Quality: Are We (Really) Doing That?
Carmine Vassallo, Fabio Palomba, Alberto Bacchelli, and Harald C. Gall
(University of Zurich, Switzerland)
Article Search
Delta Debugging Microservice Systems
Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Wenhai Li, Chao Ji, and Dan Ding
(Fudan University, China; University of Illinois at Urbana-Champaign, USA; Singapore University of Technology and Design, Singapore)
Article Search
Loop Path Reduction by State Pruning
Jianxiong Gao and Steve Lumetta
(University of Illinois at Urbana-Champaign, USA)
Article Search
An Empirical Investigation into Learning Bug-Fixing Patches in the Wild via Neural Machine Translation
Michele Tufano, Cody Watson, Gabriele Bavota, Massimiliano Di Penta, Martin White, and Denys Poshyvanyk
(College of William and Mary, USA; University of Lugano, Switzerland; University of Sannio, Italy)
Article Search
ReScue: Crafting Regular Expression DoS Attacks
Yuju Shen, Yanyan Jiang, Chang Xu, Ping Yu, Xiaoxing Ma, and Jian Lu
(Nanjing University, China)
Article Search
TRIMMER: Application Specialization for Code Debloating
Hashim Sharif, Muhammad Abubakar, Ashish Gehani, and Fareed Zaffar
(University of Illinois at Urbana-Champaign, USA; Lahore University of Management Sciences, Pakistan; SRI International, n.n.)
Article Search
Automated Model Repair for Alloy
Kaiyuan Wang, Allison Sullivan, and Sarfraz Khurshid
(University of Texas at Austin, USA)
Article Search
Break the Dead End of Dynamic Slicing: Localizing Data and Control Omission Bug
Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai, Haijun Wang, and Jinsong Dong
(National University of Singapore, Singapore; Singapore University of Technology and Design, Singapore; Singapore Institute of Technology, Singapore; Nanyang Technological University, Singapore)
Article Search
Characterizing and Identifying Misexposed Activities in Android Applications
Jiwei Yan, Xi Deng, Ping Wang, Tianyong Wu, Jun Yan, and Jian Zhang
(Institute of Software at Chinese Academy of Sciences, China)
Article Search
Automated Directed Fairness Testing
Sakshi Udeshi, Pryanshu Arora, and Sudipta Chattopadhyay
(Singapore University of Technology and Design, Singapore; BITS Pilani, n.n.)
Article Search
Deep Learning Based Feature Envy Detection
Hui Liu, Zhifeng Xu, and Yanzhen Zou
(Beijing Institute of Technology, China; Peking University, China)
Article Search
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
Ameni Ben Fadhel, Domenico Bianculli, and Lionel C. Briand
(University of Luxembourg, Luxembourg)
Article Search
Mining File Histories: Should We Consider Branches?
Vladimir Kovalenko, Fabio Palomba, and Alberto Bacchelli
(Delft University of Technology, Netherlands; University of Zurich, Switzerland)
Article Search
Efficiently Manifesting Asynchronous Programming Errors in Android Apps
Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, and Geguang Pu
(East China Normal University, China; Nanyang Technological University, Singapore; Chinese Academy of Sciences, China)
Article Search
Is Build Breakage Really So Harmful? Towards a Nuanced Interpretation of Historical Build Data
Keheliya Gallaba, Christian Macho, Martin Pinzger, and Shane McIntosh
(McGill University, Canada; University of Klagenfurt, Austria)
Article Search
Concolic Testing for Deep Neural Networks
Youcheng Sun, Min Wu, Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska, and Daniel Kroening
(University of Oxford, UK; University of Liverpool, UK)
Article Search
Assessing the Type Annotation Burden
John-Paul Ore, Sebastian Elbaum, Carrick Detweiler, and Lambros Karkazis
(University of Nebraska-Lincoln, USA)
Article Search
Safe Event-Driven Programming with Refinement Types
Benno Stein, Lazaro Clapp, Manu Sridharan, and Bor-Yuh Evan Chang
(University of Colorado at Boulder, USA; Uber Technologies, n.n.)
Article Search
AutoConfig: Automatic Configuration Tuning for Distributed Message Systems
Liang Bao, Xin Liu, Ziheng Xu, and Baoyin Fang
(Xidian University, China; University of California at Davis, USA)
Article Search
A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage
Caroline Lemieux and Koushik Sen
(University of California at Berkeley, USA)
Article Search
ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection
Bo Jiang, Ye Liu, and W. K. Chan
(Beihang University, China; City University of Hong Kong, China)
Article Search
Client-Specific Equivalence Checking
Federico Mora, Yi Li, Julia Rubin, and Marsha Chechik
(University of Toronto, Canada; University of British Columbia, Canada)
Article Search
PARTI: A Multi-interval Theory Solver for Symbolic Execution
Oscar Soria Dustmann, Klaus Wehrle, and Cristian Cadar
(RWTH Aachen University, Germany; Imperial College London, UK)
Article Search
A Tale of Two Cities: How WebView Induces Bugs to Android Applications
Jiajun Hu, Lili Wei, Yepang Liu, Shing-Chi Cheung, and Huaxun Huang
(Hong Kong University of Science and Technology, China; Southern University of Science and Technology, China)
Article Search
Understanding and Detecting Callback Compatibility Issues for Android Applications
Huaxun Huang, Lili Wei, Yepang Liu, and Shing-Chi Cheung
(Hong Kong University of Science and Technology, China; Southern University of Science and Technology, China)
Article Search
SEEDE: Simultaneous Execution and Editing in a Development Environment
Steven P. Reiss, Qi Xin, and Jeff Huang
(Brown University, USA)
Article Search
A Large-Scale Study of Test Coverage Evolution
Michael Hilton, Jonathan Bell, and Darko Marinov
(Carnegie Mellon University, USA; George Mason University, USA; University of Illinois at Urbana-Champaign, USA)
Article Search
Understanding and Detecting Evolution-Induced Compatibility Issues in Android Apps
Dongjie He, Lian Li, Lei Wang, Hengjie Zheng, Guangwei Li, and Jingling Xue
(Institute of Computing Technology at Chinese Academy of Sciences, China; UNSW, Australia)
Article Search
Replay without Recording of Production Bugs for Service Oriented Applications
Nipun Arora, Jonathan Bell, Franjo Ivancic, Gail Kaiser, and Baishakhi Ray
(Dropbox, n.n.; George Mason University, USA; Google, n.n.; Columbia University, USA)
Article Search
DeepRoad: GAN-Based Metamorphic Testing and Input Validation Framework for Autonomous Driving Systems
Mengshi Zhang, Yuqun Zhang, Lingming Zhang, Cong Liu, and Sarfraz Khurshid
(University of Texas at Austin, USA; Southern University of Science and Technology, China; University of Texas at Dallas, USA)
Article Search
TDROID: Exposing App Switching Attacks in Android with Control Flow Specialization
Jie Liu, Diyu Wu, and Jingling Xue
(UNSW, Australia)
Article Search
A Symbolic Model Checking Approach to the Analysis of String and Length Constraints
Hung-En Wang, Shih-Yu Chen, Fang Yu, and Jie-Hong R. Jiang
(National Taiwan University, Taiwan; National Chengchi University, Taiwan)
Article Search
Neural-Machine-Translation-Based Commit Message Generation: How Far Are We?
Zhongxin Liu, Xin Xia, Ahmed E. Hassan, David Lo, Zhenchang Xing, and Xinyu Wang
(Zhejiang University, China; Monash University, Australia; Queen's University, Canada; Singapore Management University, Singapore; Australian National University, Australia)
Article Search
API Method Recommendation without Worrying about the Task-API Knowledge Gap
Qiao Huang, Xin Xia, Zhenchang Xing, David Lo, and Xinyu Wang
(Zhejiang University, China; Monash University, Australia; Australian National University, Australia; Singapore Management University, Singapore)
Article Search
Testing Autonomous Cars for Feature Interaction Failures using Many-Objective Search
Raja Ben Abdessalem, Annibale Panichella, Shiva Nejati, Lionel C. Briand, and Thomas Stifter
(University of Luxembourg, Luxembourg; Delft University of Technology, Netherlands; IEE, Luxembourg)
Article Search
Characterizing the Natural Language Descriptions in Software Logging Statements
Pinjia He, Zhuangbin Chen, Shilin He, and Michael R. Lyu
(Chinese University of Hong Kong, China)
Article Search
Generating Reusable Web Components from Mockups
Mohammad Bajammal, Davood Mazinanian, and Ali Mesbah
(University of British Columbia, Canada)
Article Search
Domain-Independent Multi-threaded Software Model Checking
Dirk Beyer and Karlheinz Friedberger
(LMU Munich, Germany)
Article Search
Scalable Incremental Building with Dynamic Task Dependencies
Gabriël Konat, Sebastian Erdweg, and Eelco Visser
(Delft University of Technology, Netherlands)
Article Search
On Adopting Linters to Deal with Performance Concerns in Android Apps
Sarra Habchi, Xavier Blanc, and Romain Rouvoy
(Inria, France; University of Lille, France; University of Bordeaux, France; IUF, France)
Article Search
PFix: Fixing Concurrency Bugs Based on Memory Access Patterns
Huarui Lin, Zan Wang, Shuang Liu, Jun Sun, Dongdi Zhang, and Guangning Wei
(Tianjin University, China; Singapore University of Technology and Design, Singapore)
Article Search
αDiff: Cross-Version Binary Code Similarity Detection with DNN
Bingchang Liu, Wei Huo, Chao Zhang, Wenchao Li, Feng Li, Aihua Piao, and Wei Zou
(Institute of Information Engineering at Chinese Academy of Sciences, China; University at Chinese Academy of Sciences, China; Tsinghua University, China)
Article Search
Semantic Crash Bucketing
Rijnard van Tonder, John Kotheimer, and Claire Le Goues
(Carnegie Mellon University, USA)
Article Search
Tackling Combinatorial Explosion: A Study of Industrial Needs and Practices for Analyzing Highly Configurable Systems
Mukelabai Mukelabai, Damir Nesic, Salome Maro, Thorsten Berger, and Jan-Philipp Steghöfer
(Chalmers University of Technology, Sweden; University of Gothenburg, Sweden; KTH, Sweden)
Article Search
DeepGauge: Multi-granularity Testing Criteria for Deep Learning Systems
Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, Yang Liu, Jianjun Zhao, and Yadong Wang
(Harbin Institute of Technology, China; Carnegie Mellon University, USA; Nanyang Technological University, Singapore; Kyushu University, Japan; New York University Shanghai, China; University of California at Berkeley, USA; University of Illinois at Urbana-Champaign, USA; Monash University, Australia)
Article Search
Detecting and Summarizing GUI Changes in Evolving Mobile Apps
Kevin Moran, Cody Watson, John Hoskins, George Purnell, and Denys Poshyvanyk
(College of William and Mary, USA)
Article Search
PerfLearner: Learning from Bug Reports to Understand and Generate Performance Test Frames
Xue Han, Tingting Yu, and David Lo
(University of Kentucky, USA; Singapore Management University, Singapore)
Article Search
Improving Automatic Source Code Summarization via Deep Reinforcement Learning
Yao Wan, Zhou Zhao, Min Yang, Guandong Xu, Haochao Ying, Jian Wu, and Philip S. Yu
(Zhejiang University, China; Chinese Academy of Sciences, China; University of Technology Sydney, Australia; University of Illinois at Chicago, USA)
Article Search
Self-Protection of Android Systems from Inter-component Communication Attacks
Mahmoud Hammad, Joshua Garcia, and Sam Malek
(University of California at Irvine, USA)
Article Search
Tell Them Apart: Distilling Technology Differences from Crowd-Scale Comparison Discussions
Yi Huang, Chunyang Chen, Zhenchang Xing, Tian Lin, and Yang Liu
(Australian National University, Australia; Nanyang Technological University, Singapore)
Article Search
PMR: Proof Method Recommendation System for Isabelle/HOL
Yutaka Nagashima and Yilun He
(Czech Technical University, Czechia; University of Innsbruck, Austria; University of Sydney, Australia)
Article Search
Datalog-Based Scalable Semantic Diffing of Concurrent Programs
Chungha Sung, Shuvendu K. Lahiri, Constantin Enea, and Chao Wang
(University of Southern California, USA; Microsoft Research, n.n.; University of Paris Diderot, France)
Article Search
Is This Class Thread-Safe? Inferring Documentation using Graph-Based Learning
Andrew Habib and Michael Pradel
(TU Darmstadt, Germany)
Article Search
How Many of All Bugs Do We Find? A Study of Static Bug Detectors
Andrew Habib and Michael Pradel
(TU Darmstadt, Germany)
Article Search
An Automated Approach to Estimating Code Coverage Measures using Execution Logs
Boyuan Chen, Jian Song, Peng Xu, Xing Hu, and Zhen Ming (Jack) Jiang
(York University, Canada; Baidu, n.n.)
Article Search
Empirically Assessing Opportunities for Prefetching and Caching in Mobile Apps
Yixue Zhao, Paul Wat, Marcelo Schmitt Laser, and Nenad Medvidović
(University of Southern California, USA)
Article Search
Effective API Recommendation without Historical Software Repositories
Xiaoyu Liu, LiGuo Huang, and Vincent Ng
(Southern Methodist University, USA; University of Texas at Dallas, USA)
Article Search
Reducing Interactive Refactoring Effort via Clustering-Based Multi-objective Search
Vahid Alizadeh and Marouane Kessentini
(University of Michigan, USA)
Article Search
Control Flow-Guided SMT Solving for Program Verification
Jianhui Chen and Fei He
(Tsinghua University, China)
Article Search
CLDIFF: Generating Concise Linked Code Differences
Kaifeng Huang, Bihuan Chen, Xin Peng, Daihong Zhou, Ying Wang, Yang Liu, and Wenyun Zhao
(Fudan University, China; Nanyang Technological University, Singapore)
Article Search
A Genetic Algorithm for Goal-Conflict Identification
Renzo Degiovanni, Facundo Molina, Germán Regis, and Nazareno Aguirre
(National University of Río Cuarto, Argentina; CONICET, Argentina)
Article Search
Dual-Force: Understanding WebView Malware via Cross-Language Forced Execution
Zhenhao Tang, Juan Zhai, Minxue Pan, Yousra Aafer, Shiqing Ma, Xiangyu Zhang, and Jianhua Zhao
(Nanjing University, China; Purdue University, USA)
Article Search
Expandable Group Identification in Spreadsheets
Wensheng Dou, Shi Han, Liang Xu, Dongmei Zhang, and Jun Wei
(Institute of Software at Chinese Academy of Sciences, China; Microsoft Research Asia, n.n.)
Article Search
Scheduling Constraint Based Abstraction Refinement for Weak Memory Models
Liangze Yin, Wei Dong, Wanwei Liu, and Ji Wang
(National University of Defense Technology, China)
Article Search
Effectiveness and Challenges in Generating Concurrent Tests for Thread-Safe Classes
Valerio Terragni and Mauro Pezzè
(University of Lugano, Switzerland)
Article Search
Android Testing via Synthetic Symbolic Execution
Xiang Gao, Shin Hwei Tan, Zhen Dong, and Abhik Roychoudhury
(National University of Singapore, Singapore)
Article Search
A Unified Lattice Model and Framework for Purity Analyses
Dominik Helm, Florian Kübler, Michael Eichberg, Michael Reif, and Mira Mezini
(TU Darmstadt, Germany)
Article Search
Template-Guided Concolic Testing via Online Learning
Sooyoung Cha, Seonho Lee, and Hakjoo Oh
(Korea University, South Korea)
Article Search

Experience Papers

Process Driven Test Automation: Towards Autonomous and Self-Driven Software Development Teams
Davrondzhon Gafurov, Arne Erik Hurum, and Martin Markman
(Norwegian Directorate of eHealth, Norway)
Article Search
Automatic Testing of Static Program Analyzers
Alexandra Bugariu, Valentin Wüstholz, Maria Christakis, and Peter Müller
(ETH Zurich, Switzerland; MPI-SWS, Germany)
Article Search
An Empirical Study of Android Test Generation Tools in Industrial Cases
Wenyu Wang, Dengfeng Li, Wei Yang, Yurui Cao, Zhenwen Zhang, Yuetang Deng, and Tao Xie
(University of Illinois at Urbana-Champaign, USA; Tencent, China)
Article Search
Navigating the Maze: The Impact of Configurability in Bioinformatics Software
Mikaela Cashman, Myra B. Cohen, Priya Ranjan, and Robert W. Cottingham
(University of Nebraska-Lincoln, USA; University of Tennessee, USA; Oak Ridge National Laboratory, USA)
Article Search
Experiences Applying Automated Architecture Analysis Tool Suites
Ran Mo, Will Snipes, Yuanfang Cai, Srini Ramaswamy, Rick Kazman, and Martin Naedele
(Drexel University, USA; ABB Corporate Research, n.n.; ABB, n.n.; Carnegie Mellon University, USA; University of Hawaii, USA)
Article Search

New Ideas Papers

Relaxing Lightweight Formal Methods for Scalability
Jianghao Wang, Hamid Bagheri, and Myra B. Cohen
(University of Nebraska-Lincoln, USA)
Article Search
node2defect: Using Network Embedding to Improve Software Defect Prediction
Yu Qu, Ting Liu, Jianlei Chi, Yangxu Jin, Di Cui, Ancheng He, and Qinghua Zheng
(Xi'an Jiaotong University, China)
Article Search
RUDSEA: Automating Updates of Dockerfiles via Software Environment Analysis
Foyzul Hassan, Rodney Rodriguez, and Xiaoyin Wang
(University of Texas at San Antonio, USA)
Article Search
A Neural Framework for Retrieval and Summarization of Source Code
Qingying Chen and Minghui Zhou
(Peking University, China)
Article Search
Personalized Teammate Recommendation for Crowdsourced Software Developers
Luting Ye, Hailong Sun, Xu Wang, and Jiaruijue Wang
(Beihang University, China; Beijing Advanced Innovation Center for Big Data and Brain Computing, China)
Article Search

Tool Demonstrations

jStanley: Placing a Green Thumb on Java Collections
Rui Pereira, Pedro Simão, Jácome Cunha, and João Saraiva
(INESC TEC, Portugal; University of Minho, Portugal; NOVA-LINCS, Portugal; Universidade Nova Lisboa, Portugal)
Article Search
Descartes: A PITest Engine to Detect Pseudo-Tested Methods
Oscar Luis Vera Pérez, Martin Monperrus, and Benoit Baudry
(Inria, France; KTH, Sweden)
Article Search
The Electrum Analyzer: Model Checking Relational First-Order Temporal Specifications
Julien Brunel, David Chemouil, Alcino Cunha, and Nuno Macedo
(ONERA, France; University of Toulouse, France; INESC TEC, Portugal; University of Minho, Portugal)
Article Search
DKVF: A Framework for Rapid Prototyping and Evaluating Distributed Key-Value Stores
Mohammad Roohitavaf and Sandeep Kulkarni
(Michigan State University, USA)
Article Search
OCELOT: A Search-Based Test-Data Generation Tool for C
Simone Scalabrino, Giovanni Grano, Dario Di Nucci, Michele Guerra, Andrea De Lucia, Harald C. Gall, and Rocco Oliveto
(University of Molise, Italy; University of Zurich, Switzerland; Vrije Universiteit Brussel, Belgium; University of Salerno, Italy)
Article Search
CPA-SymExec: Efficient Symbolic Execution in CPAchecker
Dirk Beyer and Thomas Lemberger
(LMU Munich, Germany)
Article Search
DroidMate-2: A Platform for Android Test Generation
Nataniel P. Borges Jr., Jenny Hotzkow, and Andreas Zeller
(Saarland University, Germany)
Article Search Info
VulSeeker: A Semantic Learning Based Vulnerability Seeker for Cross-Platform Binary
Jian Gao, Xin Yang, Ying Fu, Yu Jiang, and Jiaguang Sun
(Tsinghua University, China)
Article Search
ESBMC 5.0: An Industrial-Strength C Model Checker
Mikhail Ramalho, Felipe R. Monteiro, Jeremy Morse, Lucas Cordeiro, Bernd Fischer, and Denis Nicole
(University of Southampton, UK; Federal University of Amazonas, Brazil; University of Bristol, UK; University of Manchester, UK; Stellenbosch University, South Africa)
Article Search
SRCIROR: A Toolset for Mutation Testing of C Source Code and LLVM Intermediate Representation
Farah Hariri and August Shi
(University of Illinois at Urbana-Champaign, USA)
Article Search
Live Versioning of Web Applications through Refactoring
Julián Grigera, Juan Cruz Gardey, Alejandra Garrido, and Gustavo Rossi
(National University of La Plata, Argentina)
Article Search
Code2graph: Automatic Generation of Static Call-Graphs for Python Source Code
Gharib Gharibi, Rashmi Tripathi, and Yugyung Lee
(University of Missouri-Kansas City, USA)
Article Search
CANAL: A Cache Timing Analysis Framework via LLVM Transformation
Chungha Sung, Brandon Paulsen, and Chao Wang
(University of Southern California, USA)
Article Search
Lightweight Source Code Monitoring with Triggr
Alim Ozdemir, Ayse Tosun, Hakan Erdogmus, and Rui Abreu
(Istanbul Technical University, Turkey; Carnegie Mellon University, USA; University of Lisbon, Portugal)
Article Search
L-CMP: An Automatic Learning-Based Parameterized Verification Tool
Jialun Cao, Yongjian Li, and Jun Pang
(n.n., China)
Article Search
code_call_lens: Raising the Developer Awareness of Critical Code
Andrea Janes, Michael Mairegger, and Barbara Russo
(Free University of Bolzano, Italy)
Article Search

proc time: 0.47