Powered by
31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2023),
December 3–9, 2023,
San Francisco, CA, USA
Frontmatter
Keynotes
Research Papers
Human Aspects I
Do CONTRIBUTING Files Provide Information about OSS Newcomers’ Onboarding Barriers?
Felipe Fronchetti,
David C. Shepherd,
Igor Wiese,
Christoph Treude,
Marco Aurélio Gerosa, and
Igor Steinmacher
(Virginia Commonwealth University, USA; Lousiana State University, USA; Federal University of Technology Paraná, Brazil; University of Melbourne, Australia; Northern Arizona University, USA)
Publisher's Version
Info
Testing I
DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems
Longtian Wang,
Xiaofei Xie,
Xiaoning Du,
Meng Tian,
Qing Guo,
Zheng Yang, and
Chao Shen
(Xi’an Jiaotong University, China; Singapore Management University, Singapore; Monash University, Australia; A*STAR, Singapore; Huawei, China)
Publisher's Version
CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering Arrays
Qiyuan Zhao,
Chuan Luo,
Shaowei Cai,
Wei Wu,
Jinkun Lin,
Hongyu Zhang, and
Chunming Hu
(Beihang University, China; Institute of Software at Chinese Academy of Sciences, China; Central South University, China; Xiangjiang Laboratory, China; SeedMath Technology, China; Chongqing University, China)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Reusable
Machine Learning I
Automated Repair I
Empirical Studies I
Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study
Xiaokai Wei,
Sujan Kumar Gonugondla,
Shiqi Wang,
Wasi Ahmad,
Baishakhi Ray,
Haifeng Qian,
Xiaopeng Li,
Varun Kumar,
Zijian Wang,
Yuchen Tian,
Qing Sun,
Ben Athiwaratkun,
Mingyue Shang,
Murali Krishna Ramanathan,
Parminder Bhatia, and
Bing Xiang
(AWS AI Labs, USA)
Publisher's Version
Testing II
Software Evolution I
Program Analysis I
An Automated Approach to Extracting Local Variables
Xiaye Chi,
Hui Liu,
Guangjie Li,
Weixiao Wang,
Yunni Xia,
Yanjie Jiang,
Yuxia Zhang, and
Weixing Ji
(Beijing Institute of Technology, China; National Innovation Institute of Defense Technology, China; Chongqing University, China)
Publisher's Version
Published Artifact
Artifacts Available
Code Search and Text to Code
Natural Language to Code: How Far Are We?
Shangwen Wang,
Mingyang Geng,
Bo Lin,
Zhensu Sun,
Ming Wen,
Yepang Liu,
Li Li,
Tegawendé F. Bissyandé, and
Xiaoguang Mao
(National University of Defense Technology, China; Singapore Management University, Singapore; Huazhong University of Science and Technology, China; Southern University of Science and Technology, China; Beihang University, China; University of Luxembourg, Luxembourg)
Publisher's Version
Published Artifact
Artifacts Available
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model
Xiangzhe Xu,
Zhou Xuan,
Shiwei Feng,
Siyuan Cheng,
Yapeng Ye,
Qingkai Shi,
Guanhong Tao,
Le Yu,
Zhuo Zhang, and
Xiangyu Zhang
(Purdue University, USA)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Reusable
Log Analysis and Debugging
Machine Learning II
Fault Diagnosis and Root Cause Analysis I
Automata-Based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android
Enze Ma,
Shan Huang,
Weigang He,
Ting Su,
Jue Wang,
Huiyu Liu,
Geguang Pu, and
Zhendong Su
(East China Normal University, China; Nanjing University, China; ETH Zurich, Switzerland)
Publisher's Version
Human Aspects II
Testing III
Outage-Watch: Early Prediction of Outages using Extreme Event Regularizer
Shubham Agarwal,
Sarthak Chakraborty,
Shaddy Garg,
Sumit Bisht,
Chahat Jain,
Ashritha Gonuguntla, and
Shiv Saini
(Adobe Research, India; University of Illinois at Urbana-Champaign, USA; Adobe, India; Amazon, India; Traceable.ai, India; Cisco, India)
Publisher's Version
Software Evolution II
Program Analysis II
Clone and Similarity Detection
Performance
IoPV: On Inconsistent Option Performance Variations
Jinfu Chen,
Zishuo Ding,
Yiming Tang,
Mohammed Sayagh,
Heng Li,
Bram Adams, and
Weiyi Shang
(Wuhan University, China; University of Waterloo, Canada; Rochester Institute of Technology, USA; ÉTS, Canada; Polytechnique Montréal, Canada; Queen’s University, Canada)
Publisher's Version
Machine Learning III
Deep Learning Based Feature Envy Detection Boosted by Real-World Examples
Bo Liu,
Hui Liu,
Guangjie Li,
Nan Niu,
Zimao Xu,
Yifan Wang,
Yunni Xia,
Yuxia Zhang, and
Yanjie Jiang
(Beijing Institute of Technology, China; National Innovation Institute of Defense Technology, China; University of Cincinnati, USA; Huawei Cloud, China; Chongqing University, China; Peking University, China)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Functional
Security I
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java
Kaixuan Li,
Sen Chen,
Lingling Fan,
Ruitao Feng,
Han Liu,
Chengwei Liu,
Yang Liu, and
Yixiang Chen
(East China Normal University, China; Tianjin University, China; Nankai University, China; UNSW, Australia; Nanyang Technological University, Singapore)
Publisher's Version
Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects
Lida Zhao,
Sen Chen,
Zhengzi Xu,
Chengwei Liu,
Lyuye Zhang,
Jiahui Wu,
Jun Sun, and
Yang Liu
(Singapore Management University, Singapore; Tianjin University, China; Nanyang Technological University, Singapore)
Publisher's Version
Fault Diagnosis and Root Cause Analysis II
Fuzzing
Enhancing Coverage-Guided Fuzzing via Phantom Program
Mingyuan Wu,
Kunqiu Chen,
Qi Luo,
Jiahong Xiang,
Ji Qi,
Junjie Chen,
Heming Cui, and
Yuqun Zhang
(Southern University of Science and Technology, China; University of Hong Kong, China; Tianjin University, China)
Publisher's Version
SJFuzz: Seed and Mutator Scheduling for JVM Fuzzing
Mingyuan Wu,
Yicheng Ouyang,
Minghai Lu,
Junjie Chen,
Yingquan Zhao,
Heming Cui,
Guowei Yang, and
Yuqun Zhang
(Southern University of Science and Technology, China; University of Hong Kong, China; Tianjin University, China; University of Queensland, Australia)
Publisher's Version
A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing
Guixin Ye,
Tianmin Hu,
Zhanyong Tang,
Zhenye Fan,
Shin Hwei Tan,
Bo Zhang,
Wenxiang Qian, and
Zheng Wang
(Northwest University, China; Concordia University, Canada; Tencent, China; University of Leeds, UK)
Publisher's Version
Published Artifact
Artifacts Available
Formal Verification
Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering
Bin Yu,
Cong Tian,
Hengrui Xing,
Zuchao Yang,
Jie Su,
Xu Lu,
Jiyu Yang,
Liang Zhao,
Xiaofeng Li, and
Zhenhua Duan
(Xidian University, China; Beijing Institute of Control Engineering, China)
Publisher's Version
Info
Automated Repair II
Human Aspects III
How Practitioners Expect Code Completion?
Chaozheng Wang,
Junhao Hu,
Cuiyun Gao,
Yu Jin,
Tao Xie,
Hailiang Huang,
Zhenyu Lei, and
Yuetang Deng
(Chinese University of Hong Kong, China; Peking University, China; Tencent, USA; Tencent, China)
Publisher's Version
Testing IV
API-Knowledge Aware Search-Based Software Testing: Where, What, and How
Xiaoxue Ren,
Xinyuan Ye,
Yun Lin,
Zhenchang Xing,
Shuqing Li, and
Michael R. Lyu
(Zhejiang University, China; Australian National University, Australia; Shanghai Jiao Tong University, China; CSIRO’s Data61, Australia; Chinese University of Hong Kong, China)
Publisher's Version
Machine Learning IV
Program Analysis III
BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework
Zewen Sun,
Duanchen Xu,
Yiyu Zhang,
Yun Qi,
Yueyang Wang,
Zhiqiang Zuo,
Zhaokang Wang,
Yue Li,
Xuandong Li,
Qingda Lu,
Wenwen Peng, and
Shengjian Guo
(Nanjing University, China; Alibaba Group, USA; Alibaba Group, China; Baidu Research, USA)
Publisher's Version
Published Artifact
Artifacts Available
Empirical Studies II
Models of Code and Documentation
Grace: Language Models Meet Code Edits
Priyanshu Gupta,
Avishree Khare,
Yasharth Bajpai,
Saikat Chakraborty,
Sumit Gulwani,
Aditya Kanade,
Arjun Radhakrishna,
Gustavo Soares, and
Ashish Tiwari
(Microsoft, India; University of Pennsylvania, USA; Microsoft Research, USA; Microsoft, USA; Microsoft Research, India)
Publisher's Version
Published Artifact
Archive submitted (770 kB)
Artifacts Available
Machine Learning V
Security II
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors
Ruoxi Sun,
Minhui Xue,
Gareth Tyson,
Tian Dong,
Shaofeng Li,
Shuo Wang,
Haojin Zhu,
Seyit Camtepe, and
Surya Nepal
(CSIRO’s Data61, Australia; Cybersecurity CRC, Australia; Hong Kong University of Science and Technology, China; Shanghai Jiao Tong University, China; Peng Cheng Laboratory, China)
Publisher's Version
Published Artifact
Artifacts Available
Industry
Industry Papers
Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection
Haotian Si,
Changhua Pei,
Zhihan Li,
Yadong Zhao,
Jingjing Li,
Haiming Zhang,
Zulong Diao,
Jianhui Li,
Gaogang Xie, and
Dan Pei
(Computer Network Information Center at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; Kuaishou Technology, China; Institute of Computing Technology at Chinese Academy of Sciences, China; Purple Mountain Laboratories, China; Tsinghua University, China)
Publisher's Version
Info
Assess and Summarize: Improve Outage Understanding with Large Language Models
Pengxiang Jin,
Shenglin Zhang,
Minghua Ma,
Haozhe Li,
Yu Kang,
Liqun Li,
Yudong Liu,
Bo Qiao,
Chaoyun Zhang,
Pu Zhao,
Shilin He,
Federica Sarro,
Yingnong Dang,
Saravan Rajmohan,
Qingwei Lin, and
Dongmei Zhang
(Nankai University, China; Microsoft, China; Peking University, China; University College London, UK)
Publisher's Version
Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data
Will Shackleton,
Katriel Cohn-Gordon,
Peter C. Rigby,
Rui Abreu,
James Gill,
Nachiappan Nagappan,
Karim Nakad,
Ioannis Papagiannis,
Luke Petre,
Giorgi Megreli,
Patrick Riggs, and
James Saindon
(Meta, USA; Concordia University, Canada)
Publisher's Version
From Point-wise to Group-wise: A Fast and Accurate Microservice Trace Anomaly Detection Approach
Zhe Xie,
Changhua Pei,
Wanxue Li,
Huai Jiang,
Liangfei Su,
Jianhui Li,
Gaogang Xie, and
Dan Pei
(Tsinghua University, China; Computer Network Information Center at Chinese Academy of Sciences, China; eBay, China)
Publisher's Version
STEAM: Observability-Preserving Trace Sampling
Shilin He,
Botao Feng,
Liqun Li,
Xu Zhang,
Yu Kang,
Qingwei Lin,
Saravan Rajmohan, and
Dongmei Zhang
(Microsoft Research, Beijing, China; Microsoft, Beijing, China; Microsoft, USA)
Publisher's Version
TraceDiag: Adaptive, Interpretable, and Efficient Root Cause Analysis on Large-Scale Microservice Systems
Ruomeng Ding,
Chaoyun Zhang,
Lu Wang,
Yong Xu,
Minghua Ma,
Xiaomin Wu,
Meng Zhang,
Qingjun Chen,
Xin Gao,
Xuedong Gao,
Hao Fan,
Saravan Rajmohan,
Qingwei Lin, and
Dongmei Zhang
(Microsoft, China; Microsoft 365, China; Microsoft 365, USA)
Publisher's Version
Appaction: Automatic GUI Interaction for Mobile Apps via Holistic Widget Perception
Yongxiang Hu,
Jiazhen Gu,
Shuqing Hu,
Yu Zhang,
Wenjie Tian,
Shiyu Guo,
Chaoyi Chen, and
Yangfan Zhou
(Fudan University, China; Meituan, China; Shanghai Key Laboratory of Intelligent Information Processing, China)
Publisher's Version
C³: Code Clone-Based Identification of Duplicated Components
Yanming Yang,
Ying Zou,
Xing Hu,
David Lo,
Chao Ni,
John Grundy, and
Xin Xia
(Zhejiang University, China; Queen’s University, Canada; Singapore Management University, Singapore; Monash University, Australia; Huawei, China)
Publisher's Version
Detection Is Better Than Cure: A Cloud Incidents Perspective
Vaibhav Ganatra,
Anjaly Parayil,
Supriyo Ghosh,
Yu Kang,
Minghua Ma,
Chetan Bansal,
Suman Nath, and
Jonathan Mace
(Microsoft, India; Microsoft, China; Microsoft, USA)
Publisher's Version
EvoCLINICAL: Evolving Cyber-Cyber Digital Twin with Active Transfer Learning for Automated Cancer Registry System
Chengjie Lu,
Qinghua Xu,
Tao Yue,
Shaukat Ali,
Thomas Schwitalla, and
Jan F. Nygård
(Simula Research Laboratory, Norway; University of Oslo, Norway; Oslo Metropolitan University, Norway; Cancer Registry of Norway, Norway; Arctic University of Norway, Norway)
Publisher's Version
Compositional Taint Analysis for Enforcing Security Policies at Scale
Subarno Banerjee,
Siwei Cui,
Michael Emmi,
Antonio Filieri,
Liana Hadarean,
Peixuan Li,
Linghui Luo,
Goran Piskachev,
Nicolás Rosner,
Aritra Sengupta,
Omer Tripp, and
Jingbo Wang
(Amazon Web Services, USA; Texas A&M University, USA; Amazon Web Services, Germany; University of Southern California, USA)
Publisher's Version
Industry Short Papers
Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365
Fangkai Yang,
Wenjie Yin,
Lu Wang,
Tianci Li,
Pu Zhao,
Bo Liu,
Paul Wang,
Bo Qiao,
Yudong Liu,
Mårten Björkman,
Saravan Rajmohan,
Qingwei Lin, and
Dongmei Zhang
(Microsoft, China; KTH Royal Institute of Technology, Sweden; Microsoft, USA)
Publisher's Version
Ideas, Visions, and Reflections
A Vision on Intentions in Software Engineering
Jacob Krüger,
Yi Li,
Chenguang Zhu,
Marsha Chechik,
Thorsten Berger, and
Julia Rubin
(Eindhoven University of Technology, Netherlands; Nanyang Technological University, Singapore; University of Texas at Austin, USA; University of Toronto, Canada; Ruhr University Bochum, Germany; Chalmers - University of Gothenburg, Sweden; University of British Columbia, Canada)
Publisher's Version
Demonstrations
MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors
Amit Seal Ami,
Syed Yusuf Ahmed,
Radowan Mahmud Redoy,
Nathan Cooper,
Kaushal Kafle,
Kevin Moran,
Denys Poshyvanyk, and
Adwait Nadkarni
(College of William and Mary, USA; University of Dhaka, Bangladesh; University of Central Florida, USA)
Publisher's Version
Student Research Competition
proc time: 29.55