Powered by
31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2023),
December 3–9, 2023,
San Francisco, CA, USA
Frontmatter
Research Papers
Papers
Grace: Language Models Meet Code Edits
Priyanshu Gupta 
, Avishree Khare

, Yasharth Bajpai

, Saikat Chakraborty

,
Sumit Gulwani 
, Aditya Kanade

, Arjun Radhakrishna

, Gustavo Soares

, and Ashish Tiwari
(Microsoft, India; University of Pennsylvania, USA; Microsoft Research, USA; Microsoft, USA; Microsoft Research, India)
Article Search
Archive submitted (770 kB)
An Automated Approach to Extracting Local Variables
Xiaye Chi

, Hui Liu

, Guangjie Li

, Weixiao Wang

, Yunni Xia

, Yanjie Jiang

,
Yuxia Zhang 
, and Weixing Ji
(Beijing Institute of Technology, China; National Innovation Institute of Defense Technology, China; Chongqing University, China)
Article Search
Artifacts Available
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java
Kaixuan Li

, Sen Chen

, Lingling Fan

, Ruitao Feng

, Han Liu

, Chengwei Liu

, Yang Liu

, and Yixiang Chen
(East China Normal University, China; Tianjin University, China; Nankai University, China; UNSW, Australia; Nanyang Technological University, Singapore)
Article Search
DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems
Longtian Wang

,
Xiaofei Xie 
, Xiaoning Du

, Meng Tian

, Qing Guo

, Zheng Yang

, and Chao Shen
(Xi’an Jiaotong University, China; Singapore Management University, Singapore; Monash University, Australia; A*STAR, Singapore; Huawei, China)
Article Search
API-Knowledge Aware Search-Based Software Testing: Where, What, and How
Xiaoxue Ren

, Xinyuan Ye

, Yun Lin

, Zhenchang Xing

, Shuqing Li

, and Michael R. Lyu
(Zhejiang University, China; Australian National University, Australia; Shanghai Jiao Tong University, China; CSIRO’s Data61, Australia; Chinese University of Hong Kong, China)
Article Search
Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering
Bin Yu

, Cong Tian

, Hengrui Xing

, Zuchao Yang

, Jie Su

, Xu Lu

, Jiyu Yang

, Liang Zhao

, Xiaofeng Li

, and Zhenhua Duan
(Xidian University, China; Beijing Institute of Control Engineering, China)
Article Search
Info
SJFuzz: Seed and Mutator Scheduling for JVM Fuzzing
Mingyuan Wu

, Yicheng Ouyang

, Minghai Lu

, Junjie Chen

, Yingquan Zhao

, Heming Cui

, Guowei Yang

, and Yuqun Zhang
(Southern University of Science and Technology, China; University of Hong Kong, China; Tianjin University, China; University of Queensland, Australia)
Article Search
How Practitioners Expect Code Completion?
Chaozheng Wang

, Junhao Hu

, Cuiyun Gao

, Yu Jin

, Tao Xie

, Hailiang Huang

, Zhenyu Lei

, and Yuetang Deng
(Chinese University of Hong Kong, China; Peking University, China; Tencent, USA; Tencent, China)
Article Search
CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering Arrays
Qiyuan Zhao

, Chuan Luo

, Shaowei Cai

, Wei Wu

, Jinkun Lin

, Hongyu Zhang

, and Chunming Hu
(Beihang University, China; Institute of Software at Chinese Academy of Sciences, China; Central South University, China; Xiangjiang Laboratory, China; SeedMath Technology, China; Chongqing University, China)
Article Search
Enhancing Coverage-Guided Fuzzing via Phantom Program
Mingyuan Wu

, Kunqiu Chen

, Qi Luo

, Jiahong Xiang

, Ji Qi

, Junjie Chen

, Heming Cui

, and Yuqun Zhang
(Southern University of Science and Technology, China; University of Hong Kong, China; Tianjin University, China)
Article Search
Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects
Lida Zhao

, Sen Chen

, Zhengzi Xu

, Chengwei Liu

, Lyuye Zhang

, Jiahui Wu

,
Jun Sun 
, and Yang Liu
(Nanyang Technological University, Singapore; Tianjin University, China; Singapore Management University, Singapore)
Article Search
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model
Xiangzhe Xu

, Zhou Xuan

, Shiwei Feng

, Siyuan Cheng

, Yapeng Ye

, Qingkai Shi

, Guanhong Tao

, Le Yu

, Zhuo Zhang

, and
Xiangyu Zhang
(Purdue University, USA)
Article Search
Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study
Xiaokai Wei

, Sujan Kumar Gonugondla

, Shiqi Wang

, Wasi Ahmad

, Baishakhi Ray

, Haifeng Qian

, Xiaopeng Li

, Varun Kumar

, Zijian Wang

, Yuchen Tian

, Qing Sun

, Ben Athiwaratkun

, Mingyue Shang

, Murali Krishna Ramanathan

, Parminder Bhatia

, and Bing Xiang
(AWS AI Labs, USA)
Article Search
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors
Ruoxi Sun

, Minhui Xue

, Gareth Tyson

, Tian Dong

, Shaofeng Li

, Shuo Wang

, Haojin Zhu

, Seyit Camtepe

, and Surya Nepal
(CSIRO’s Data61, Australia; Hong Kong University of Science and Technology, China; Shanghai Jiao Tong University, China)
Article Search
Outage-Watch: Early Prediction of Outages using Extreme Event Regularizer
Shubham Agarwal

, Sarthak Chakraborty

, Shaddy Garg

, Sumit Bisht

, Chahat Jain

, Ashritha Gonuguntla

, and Shiv Saini
(Adobe Research, India; University of Illinois at Urbana-Champaign, USA; Amazon, India; Traceable.ai, India; Cisco, India)
Article Search
IoPV: On Inconsistent Option Performance Variations
Jinfu Chen

, Zishuo Ding

, Yiming Tang

, Mohammed Sayagh

, Heng Li

, Bram Adams

, and Weiyi Shang
(Wuhan University, China; University of Waterloo, Canada; Rochester Institute of Technology, USA; ÉTS, Canada; Polytechnique Montréal, Canada; Queen’s University, Canada)
Article Search
Natural Language to Code: How Far Are We?
Shangwen Wang 
, Mingyang Geng

, Bo Lin

, Zhensu Sun

,
Ming Wen 
, Yepang Liu

, Li Li

, Tegawendé F. Bissyandé

, and Xiaoguang Mao
(National University of Defense Technology, China; ShanghaiTech University, China; Monash University, Australia; Huazhong University of Science and Technology, China; Southern University of Science and Technology, China; University of Luxembourg, Luxembourg)
Article Search
A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing
Guixin Ye

, Tianmin Hu

, Zhanyong Tang

, Zhenye Fan

, Shin Hwei Tan

, Bo Zhang

, Wenxiang Qian

, and
Zheng Wang
(Northwest University, China; Concordia University, Canada; Tencent, China; University of Leeds, UK)
Article Search
BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework
Zewen Sun

, Duanchen Xu

, Yiyu Zhang

, Yun Qi

, Yueyang Wang

,
Zhiqiang Zuo 
, Zhaokang Wang

, Yue Li

, Xuandong Li

, Qingda Lu

, Wenwen Peng

, and Shengjian Guo
(Nanjing University, China; Alibaba Group, USA; Alibaba Group, China; Baidu Research, USA)
Article Search
Deep Learning Based Feature Envy Detection Boosted by Real-World Examples
Bo Liu

, Hui Liu

, Guangjie Li

,
Nan Niu 
, Zimao Xu

, Yifan Wang

, Yunni Xia

,
Yuxia Zhang 
, and Yanjie Jiang
(Beijing Institute of Technology, China; National Innovation Institute of Defense Technology, China; University of Cincinnati, USA; Huawei Cloud, China; Chongqing University, China)
Article Search
Artifacts Available
Automata-Based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android
Enze Ma

, Shan Huang

, Weigang He

, Ting Su

,
Jue Wang 
, Huiyu Liu

, Geguang Pu

, and Zhendong Su
(East China Normal University, China; Nanjing University, China; ETH Zurich, Switzerland)
Article Search
Industry
Papers
From Point-wise to Group-wise: A Fast and Accurate Microservice Trace Anomaly Detection Approach
Zhe Xie

, Changhua Pei

, Wanxue Li

, Huai Jiang

, Liangfei Su

, Jianhui Li

, Gaogang Xie

, and Dan Pei
(Tsinghua University, China; Computer Network Information Center at Chinese Academy of Sciences, China; eBay, China)
Article Search
TraceDiag: Adaptive, Interpretable, and Efficient Root Cause Analysis on Large-Scale Microservice Systems
Ruomeng Ding

, Chaoyun Zhang

, Lu Wang

, Yong Xu

,
Minghua Ma 
, Xiaomin Wu

, Meng Zhang

, Qingjun Chen

, Xin Gao

, Xuedong Gao

, Hao Fan

, Saravan Rajmohan

, Qingwei Lin

, and Dongmei Zhang
(Microsoft, n.n.; Microsoft, China; Microsoft 365, n.n.)
Article Search
Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365
Fangkai Yang

, Wenjie Yin

, Lu Wang

, Tianci Li

, Pu Zhao

, Bo Liu

, Paul Wang

, Bo Qiao

, Yudong Liu

, Mårten Björkman

, Saravan Rajmohan

, Qingwei Lin

, and Dongmei Zhang
(Microsoft, China; KTH Royal Institute of Technology, Sweden; Microsoft, USA)
Article Search
Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data
Will Shackleton

, Katriel Cohn-Gordon

, Peter C. Rigby

, Rui Abreu

, James Gill

, Nachiappan Nagappan

, Karim Nakad

, Ioannis Papagiannis

, Luke Petre

, Giorgi Megreli

, Patrick Riggs

, and James Saindon
(Meta, USA; Concordia University, Canada)
Preprint
STEAM: Observability-Preserving Trace Sampling
Shilin He 
, Botao Feng

, Liqun Li

, Xu Zhang

, Yu Kang

, Qingwei Lin

, Saravan Rajmohan

, and Dongmei Zhang
(Microsoft Research, Beijing, China; Microsoft, Beijing, China; Microsoft 365, USA)
Article Search
C³: Code Clone-Based Identification of Duplicated Components
Yanming Yang

, Ying Zou

, Xing Hu

,
David Lo 
,
Chao Ni 
, John Grundy

, and Xin Xia
(Zhejiang University, China; Queen’s University, Canada; Singapore Management University, Singapore; Monash University, Australia; Huawei, China)
Article Search
Appaction: Automatic GUI Interaction for Mobile Apps via Holistic Widget Perception
Yongxiang Hu

, Jiazhen Gu

, Shuqing Hu

, Yu Zhang

, Wenjie Tian

, Shiyu Guo

, Chaoyi Chen

, and Yangfan Zhou
(Fudan University, China; Meituan, China; Shanghai Key Laboratory of Intelligent Information Processing, China)
Article Search
Compositional Taint Analysis for Enforcing Security Policies at Scale
Subarno Banerjee

, Siwei Cui

, Michael Emmi

, Antonio Filieri

, Liana Hadarean

, Peixuan Li

, Linghui Luo

, Goran Piskachev

, Nicolás Rosner

, Aritra Sengupta

, Omer Tripp

, and Jingbo Wang
(Amazon Web Services, USA; Texas A&M University, USA; Amazon Web Services, Germany; University of Southern California, USA)
Article Search
Assess and Summarize: Improve Outage Understanding with Large Language Models
Pengxiang Jin

, Shenglin Zhang

,
Minghua Ma 
, Haozhe Li

, Yu Kang

, Liqun Li

, Yudong Liu

, Bo Qiao

, Chaoyun Zhang

, Pu Zhao

,
Shilin He 
,
Federica Sarro 
, Yingnong Dang

, Saravan Rajmohan

, Qingwei Lin

, and Dongmei Zhang
(Nankai University, China; Microsoft, China; Peking University, China; University College London, UK; Microsoft 365, China)
Article Search
Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection
Haotian Si

, Changhua Pei

, Zhihan Li

, Yadong Zhao

, Jingjing Li

, Haiming Zhang

, Zulong Diao

, Jianhui Li

, Gaogang Xie

, and Dan Pei
(Computer Network Information Center at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; Kuaishou Technology, China; Institute of Computing Technology at Chinese Academy of Sciences, China; Tsinghua University, China)
Preprint
Info
EvoCLINICAL: Evolving Cyber-Cyber Digital Twin with Active Transfer Learning for Automated Cancer Registry System
Chengjie Lu

, Qinghua Xu

, Tao Yue

,
Shaukat Ali 
, Thomas Schwitalla

, and Jan F. Nygård
(Simula Research Laboratory, Norway; University of Oslo, Norway; Oslo Metropolitan University, Norway; Cancer Registry of Norway, Norway; Arctic University of Norway, Norway)
Article Search
Detection Is Better Than Cure: A Cloud Incidents Perspective
Vaibhav Ganatra

, Anjaly Parayil

, Supriyo Ghosh

, Yu Kang

,
Minghua Ma 
, Chetan Bansal

,
Suman Nath 
, and Jonathan Mace
(Microsoft, India; Microsoft, China; Microsoft, USA)
Article Search
Ideas, Visions, and Reflections
Papers
A Vision on Intentions in Software Engineering
Jacob Krüger

,
Yi Li 
, Chenguang Zhu

, Marsha Chechik

, Thorsten Berger

, and
Julia Rubin
(Eindhoven University of Technology, Netherlands; Nanyang Technological University, Singapore; University of Texas at Austin, USA; University of Toronto, Canada; Ruhr University Bochum, Germany; University of British Columbia, Canada)
Article Search
Demonstrations
Papers
MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors
Amit Seal Ami 
, Syed Yusuf Ahmed

, Radowan Mahmud Redoy

, Nathan Cooper

, Kaushal Kafle

, Kevin Moran

, Denys Poshyvanyk

, and Adwait Nadkarni
(College of William and Mary, USA; University of Dhaka, Bangladesh; George Mason University, USA)
Article Search
Student Research Competition
Papers
proc time: 7.44