SANER 2019
2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering (SANER)
Powered by
Conference Publishing Consulting

2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering (SANER), February 24-27, 2019, Hangzhou, China

SANER 2019 – Proceedings

Contents - Abstracts - Authors

Frontmatter

Title Page
Message from the Chairs
Committees
Sponsors

Keynotes

Software Engineering in a Data Science Future (Keynote)
Ahmed E. Hassan
(Queen's University, Canada)
Article Search
Does Your Software Value What You Value? (Keynote)
Jon Whittle
(Monash University, Australia)
Article Search
Forward and Backward Traceability: Requirements and Challenges (Keynote)
Zhi Jin
(Peking University, China)
Article Search

Research Papers

Software Multiple-Level Change Detection Based on Two-Step MPAT Matching
Tong Wang, Dongdong Wang, Ying Zhou, and Bixin Li
(Southeast University, China)
Article Search
Pruning the AST with Hunks to Speed up Tree Differencing
Chunhua Yang and E. James Whitehead
(QILU University of Technology, China; University of California at Santa Cruz, USA)
Article Search
Expressions of Sentiments during Code Reviews: Male vs. Female
Rajshakhar Paul, Amiangshu Bosu, and Kazi Zakia Sultana
(Wayne State University, USA; Montclair University, USA)
Article Search
A Study on the Interplay between Pull Request Review and Continuous Integration Builds
Fiorella Zampetti, Gabriele Bavota, Gerardo Canfora, and Massimiliano Di Penta
(University of Sannio, Italy; USI Lugano, Switzerland)
Article Search
Confusion in Code Reviews: Reasons, Impacts, and Coping Strategies
Felipe Ebert, Fernando Castor, Nicole Novielli, and Alexander Serebrenik
(Federal University of Pernambuco, Brazil; University of Bari, Italy; Eindhoven University of Technology, Netherlands)
Article Search Info
Deep Review Sharing
Chenkai Guo, Dengrong Huang, Naipeng Dong, Quanqi Ye, Jing Xu, Yaqing Fan, Hui Yang, and Yifan Xu
(Nankai University, China; National University of Singapore, Singapore; Advanced Digital Sciences Center, Singapore)
Article Search
A Comparative Study of Software Bugs in Micro-clones and Regular Code Clones
Judith F. Islam, Manishankar Mondal, and Chanchal K. Roy
(University of Saskatchewan, Canada)
Article Search
On Precision of Code Clone Detection Tools
Farima Farmahinifarahani, Vaibhav Saini, Di Yang, Hitesh Sajnani, and Cristina V. Lopes
(University of California at Irvine, USA; Microsoft, USA)
Article Search
Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection
Lutz Büch and Artur Andrzejak
(University of Heidelberg, Germany)
Article Search
Fuzzing Program Logic Deeply Hidden in Binary Program Stages
Yanhao Wang, Zheng Leong Chua, Yuwei Liu, Purui Su, and Zhenkai Liang
(Institute of Software at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; National University of Singapore, Singapore)
Article Search
How Stable Are Eclipse Application Framework Internal Interfaces?
John Businge, Simon Kawuma, Moses Openja, Engineer Bainomugisha, and Alexander Serebrenik
(Mbarara University of Science and Technology, Uganda; Makerere University, Uganda; Eindhoven University of Technology, Netherlands)
Article Search Info
Unveiling Exception Handling Guidelines Adopted by Java Developers
Hugo Melo, Roberta Coelho, and Christoph Treude
(Federal University of Rio Grande do Norte, Brazil; University of Adelaide, Australia)
Article Search
Migrating to GraphQL: A Practical Assessment
Gleison Brito, Thais Mombach, and Marco Tulio Valente
(Federal University of Minas Gerais, Brazil)
Article Search
Are Refactorings to Blame? An Empirical Study of Refactorings in Merge Conflicts
Mehran Mahmoudi, Sarah Nadi, and Nikolaos Tsantalis
(University of Alberta, Canada; Concordia University, Canada)
Article Search
Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context
Renhao Xiong and Bixin Li
(Southeast University, China)
Article Search
Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis
Bryan J. Muscedere, Robert Hackman, Davood Anbarnam, Joanne M. Atlee, Ian J. Davis, and Michael W. Godfrey
(University of Waterloo, Canada)
Article Search
Mining Cross-Task Artifact Dependencies from Developer Interactions
Usman Ashraf, Christoph Mayr-Dorn, and Alexander Egyed
(JKU Linz, Austria)
Article Search Info
A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers
Cong Chen, Yulong Yang, Lin Yang, and Kang Zhang
(Tianjin University, China; University of Texas at Dallas, USA)
Article Search
Feature Maps: A Comprehensible Software Representation for Design Pattern Detection
Hannes Thaller, Lukas Linsbauer, and Alexander Egyed
(JKU Linz, Austria)
Article Search
Reformulating Queries for Duplicate Bug Report Detection
Oscar Chaparro, Juan Manuel Florez, Unnati Singh, and Andrian Marcus
(University of Texas at Dallas, USA)
Article Search Info
Identifying Redundancies in Fork-based Development
Luyao Ren, Shurui Zhou, Christian Kästner, and Andrzej Wąsowski
(Peking University, China; Carnegie Mellon University, USA; IT University of Copenhagen, Denmark)
Article Search
Systematic Comprehension for Developer Reply in Mobile System Forum
Chenkai Guo, Weijing Wang, Yanfeng Wu, Naipeng Dong, Quanqi Ye, Jing Xu, and Sen Zhang
(Nankai University, China; National University of Singapore, Singapore; Advanced Digital Sciences Center, Singapore)
Article Search
Improving Model Inference in Industry by Combining Active and Passive Learning
Nan Yang, Kousar Aslam, Ramon Schiffelers, Leonard Lensink, Dennis Hendriks, Loek Cleophas, and Alexander Serebrenik
(Eindhoven University of Technology, Netherlands; ASML, Netherlands; ESI/TNO, Netherlands)
Article Search
Towards Understandable Guards of Extracted State Machines from Embedded Software
Wasim Said, Jochen Quante, and Rainer Koschke
(Robert Bosch, Germany; University of Bremen, Germany)
Article Search
Mining Specifications from Documentation using a Crowd
Peng Sun, Chris Brown, Ivan Beschastnikh, and Kathryn T. Stolee
(Iowa State University, USA; North Carolina State University, USA; University of British Columbia, Canada)
Article Search
Studying Android App Popularity by Cross-Linking GitHub and Google Play Store
John Businge, Moses Openja, David Kavaler, Engineer Bainomugisha, Foutse Khomh, and Vladmir Filkov
(Mbarara University of Science and Technology, Uganda; University of California at Davis, USA; Makerere University, Uganda; Polytechnique Montréal, Canada)
Article Search
An Empirical Study of Learning to Rank Techniques for Effort-Aware Defect Prediction
Xiao Yu, Kwabena Ebo Bennin, Jin Liu, Jacky Wai Keung, Xiaofei Yin, and Zhou Xu
(Wuhan University, China; City University of Hong Kong, China; Fudan University, China)
Article Search
COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web Application
Hiroyuki Kirinuki, Haruto Tanno, and Katsuyuki Natsukawa
(NTT, Japan)
Article Search
A Comparative Study of Android Repackaged Apps Detection Techniques
Xian Zhan, Tao Zhang, and Yutian Tang
(Hong Kong Polytechnic University, China; Harbin Engineering University, China)
Article Search Info
Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps
Yangyu Hu, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, and Ren He
(Beijing University of Posts and Telecommunications, China; Monash University, Australia; Peking University, China)
Article Search
AppCommune: Automated Third-Party Libraries De-duplicating and Updating for Android Apps
Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, and Dawu Gu
(Shanghai Jiao Tong University, China)
Article Search
Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps
Wenjie Li, Yanyan Jiang, Chang Xu, Yepang Liu, Xiaoxing Ma, and Jian Lü
(Nanjing University, China; Southern University of Science and Technology, China)
Article Search
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers
Qiu-Liang Chen, Jia-Ju Bai, Zu-Ming Jiang, Julia Lawall, and Shi-Min Hu
(Tsinghua University, China; Sorbonne University, France; Inria, France; LIP6, France)
Article Search
An Empirical Study of Messaging Passing Concurrency in Go Projects
Nicolas Dilley and Julien Lange
(University of Kent, UK)
Article Search Info
A Splitting Strategy for Testing Concurrent Programs
Xiaofang Qi and Huayang Zhou
(Southeast University, China)
Article Search
Understanding Node Change Bugs for Distributed Systems
Jie Lu, Liu Chen, Lian Li, and Xiaobing Feng
(Institute of Computing Technology at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
Article Search
A Neural Model for Method Name Generation from Functional Description
Sa Gao, Chunyang Chen, Zhenchang Xing, Yukun Ma, Wen Song, and Shang-Wei Lin
(Nanyang Technological University, Singapore; Monash University, Australia; Australian National University, Australia)
Article Search
Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification
Nghi D. Q. Bui, Yijun Yu, and Lingxiao Jiang
(Singapore Management University, Singapore; Open University, UK)
Article Search
DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery
Rui Xie, Long Chen, Wei Ye, Zhiyu Li, Tianxiang Hu, Dongdong Du, and Shikun Zhang
(Peking University, China)
Article Search
CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks
Zhuo Zhang, Yan Lei, Xiaoguang Mao, and Panpan Li
(National University of Defense Technology, China; Chongqing University, China)
Article Search
Avatar: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Kui Liu, Anil Koyuncu, Dongsun Kim, and Tegawendé F. Bissyandé
(University of Luxembourg, Luxembourg)
Article Search
Bears: An Extensible Java Bug Benchmark for Automatic Program Repair Studies
Fernanda Madeiral, Simon Urli, Marcelo Maia, and Martin Monperrus
(Federal University of Uberlândia, Brazil; Inria, France; University of Lille, France; KTH, Sweden)
Article Search
Sorting and Transforming Program Repair Ingredients via Deep Learning Code Similarities
Martin White, Michele Tufano, Matías Martínez, Martin Monperrus, and Denys Poshyvanyk
(College of William and Mary, USA; Polytechnic University of Hauts-de-France, France; KTH, Sweden)
Article Search Info
On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs
Ahmed Zerouali, Tom Mens, Gregorio Robles, and Jesus M. Gonzalez-Barahona
(University of Mons, Belgium; Universidad Rey Juan Carlos, Spain)
Article Search
Exploring Regular Expression Evolution
Peipei Wang, Gina R. Bai, and Kathryn T. Stolee
(North Carolina State University, USA)
Article Search

RENE Track

Mining Scala Framework Extensions for Recommendation Patterns
Yunior Pacheco, Jonas De Bleser, Tim Molderez, Dario Di Nucci, Wolfgang De Meuter, and Coen De Roover
(Vrije Universiteit Brussel, Belgium; Pinar del Rio University, Cuba)
Article Search Info
Reuse (or Lack Thereof) in Travis CI Specifications: An Empirical Study of CI Phases and Commands
Puneet Kaur Sidhu, Gunter Mussbacher, and Shane McIntosh
(McGill University, Canada)
Article Search
Is Self-Admitted Technical Debt a Good Indicator of Architectural Divergences?
Giancarlo Sierra, Ahmad Tahmid, Emad Shihab, and Nikolaos Tsantalis
(Concordia University, Canada)
Article Search

Industry Track

Identifying Feature Clones: An Industrial Case Study
Muslim Chochlov, Michael English, Jim Buckley, Daniel Ilie, and Maria Scanlon
(University of Limerick, Ireland; Wood, Ireland)
Article Search
Towards Generating Cost-Effective Test-Suite for Ethereum Smart Contract
Xingya Wang, Haoran Wu, Weisong Sun, and Yuan Zhao
(Nanjing University, China)
Article Search
EVM*: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine
Fuchen Ma, Ying Fu, Meng Ren, Mingzhe Wang, Yu Jiang, Kaixiang Zhang, Huizhong Li, and Xiang Shi
(Beijing University of Posts and Telecommunications, China; Tsinghua University, China; Sun Yat-sen University, China; WeBank, China)
Article Search
Testing the Message Flow of Android Auto Apps
Yu Zhang, Xi Deng, Jun Yan, Hang Su, and Hongyu Gao
(Beijing University of Technology, China; Institute of Software at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
Article Search
Open-Source License Violations of Binary Software at Large Scale
Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, and Wei Huo
(Institute of Information Engineering at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; National Computer Network Emergency Response Technical Team, China)
Article Search
Qualify First! A Large Scale Modernisation Report
Leszek Włodarski, Boris Pereira, Ivan Povazan, Johan Fabry, and Vadim Zaytsev
(mBank, Poland; Raincode Labs, Belgium)
Article Search
Challenges of SonarQube Plug-In Maintenance
Bence Barta, Günter Manz, István Siket, and Rudolf Ferenc
(University of Szeged, Hungary; FrontEndART Software, Hungary)
Article Search Video Info
GUI Migration using MDE from GWT to Angular 6: An Industrial Case
Benoît Verhaeghe, Anne Etien, Nicolas Anquetil, Abderrahmane Seriai, Laurent Deruelle, Stéphane Ducasse, and Mustapha Derras
(University of Lille, France; CNRS, France; Inria, France; Berger-Levrault, France)
Article Search

ERA Track

Program State Coverage: A Test Coverage Metric Based on Executed Program States
Khashayar Etemadi Someoliayi, Sajad Jalali, Mostafa Mahdieh, and Seyed-Hassan Mirian-Hosseinabadi
(Sharif University of Technology, Iran)
Article Search
On the Diversity of Software Package Popularity Metrics: An Empirical Study of npm
Ahmed Zerouali, Tom Mens, Gregorio Robles, and Jesus M. Gonzalez-Barahona
(University of Mons, Belgium; Universidad Rey Juan Carlos, Spain)
Article Search
On the Impact of Refactoring Operations on Code Naturalness
Bin Lin, Csaba Nagy, Gabriele Bavota, and Michele Lanza
(USI Lugano, Switzerland)
Article Search
Knowledge Graphing Git Repositories: A Preliminary Study
Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, and John Grundy
(Beijing University of Posts and Telecommunications, China; Harbin Institute of Technology, China; Monash University, Australia)
Article Search
Should You Consider Adware as Malware in Your Study?
Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, and Jacques Klein
(University of Luxembourg, Luxembourg; Monash University, Australia)
Article Search
Please Help! A Preliminary Study on the Effect of Social Proof and Legitimization of Paltry Contributions in Donations to OSS
Ugo Yukizawa, Masateru Tsunoda, and Amjed Tahir
(Kindai University, Japan; Massey University, New Zealand)
Article Search
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems
Lei Ma, Felix Juefei-Xu, Minhui Xue, Bo Li, Li Li, Yang Liu, and Jianjun Zhao
(Harbin Institute of Technology, China; Carnegie Mellon University, USA; Macquarie University, Australia; University of Illinois at Urbana-Champaign, USA; Monash University, Australia; Nanyang Technological University, Singapore; Kyushu University, Japan)
Article Search
On the Impact of Outdated and Vulnerable Javascript Packages in Docker Images
Ahmed Zerouali, Valerio Cosentino, Tom Mens, Gregorio Robles, and Jesus M. Gonzalez-Barahona
(University of Mons, Belgium; Bitergia, Spain; Universidad Rey Juan Carlos, Spain)
Article Search

Tool Demonstrations

GuardiaML: Machine Learning-Assisted Dynamic Information Flow Control
Angel Luis Scull Pupo, Jens Nicolay, Kyriakos Efthymiadis, Ann Nowé, Coen De Roover, and Elisa Gonzalez Boix
(Vrije Universiteit Brussel, Belgium)
Article Search
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps
Davide Pizzolotto, Roberto Fellin, and Mariano Ceccato
(Fondazione Bruno Kessler, Italy; University of Trento, Italy)
Article Search
Madoop: Improving Browser-Based Volunteer Computing Based on Modern Web Technologies
Hiroyuki Matsuo, Shinsuke Matsumoto, Yoshiki Higo, and Shinji Kusumoto
(Osaka University, Japan)
Article Search Info
Automating Performance Antipattern Detection and Software Refactoring in UML Models
Davide Arcelli, Vittorio Cortellessa, and Daniele Di Pompeo
(University of L'Aquila, Italy)
Article Search Video
ICSD: Interactive Visual Support for Understanding Code Control Structure
Ahmad Jbara, Mousa Agbaria, Alon Adoni, Malek Jabareen, and Ameen Yasin
(Netanya Academic College, Israel; University of Connecticut, USA)
Article Search
GoCity: Code City for Go
Rodrigo Brito, Aline Brito, Gleison Brito, and Marco Tulio Valente
(Federal University of Minas Gerais, Brazil)
Article Search Info

proc time: 1.19