Powered by
Proceedings of the ACM on Software Engineering, Volume 2, Number FSE,
June 23–27, 2025,
Trondheim, Norway
Frontmatter
Papers
On-Demand Scenario Generation for Testing Automated Driving Systems
Songyang Yan,
Xiaodong Zhang,
Kunkun Hao,
Haojie Xin,
Yonggang Luo,
Jucheng Yang,
Ming Fan,
Chao Yang,
Jun Sun, and
Zijiang Yang
(Xi'an Jiaotong University, China; Xidian University, China; Synkrotron, China; Chongqing Changan Automobile, China; Singapore Management University, Singapore; University of Science and Technology of China, China)
Article Search
Info
Smart Contract Fuzzing Towards Profitable Vulnerabilities
Ziqiao Kong,
Cen Zhang,
Maoyi Xie,
Ming Hu,
Yue Xue,
Ye Liu,
Haijun Wang, and
Yang Liu
(Nanyang Technological University, Singapore; Singapore Management University, Singapore; MetaTrust Labs, Singapore; Xi'an Jiaotong University, China)
Preprint
Info
Artifacts Available
Code Change Intention, Development Artifact, and History Vulnerability: Putting Them Together for Vulnerability Fix Detection by LLM
Xu Yang,
Wenhan Zhu,
Michael Pacheco,
Jiayuan Zhou,
Shaowei Wang,
Xing Hu, and
Kui Liu
(University of Manitoba, Canada; Huawei, Canada; Zhejiang University, China; Huawei Software Engineering Application Technology Lab, China)
Article Search
Automated Soap Opera Testing Directed by LLMs and Scenario Knowledge: Feasibility, Challenges, and Road Ahead
Yanqi Su,
Zhenchang Xing,
Chong Wang,
Chunyang Chen,
Sherry (Xiwei) Xu,
Qinghua Lu, and
Liming Zhu
(Australian National University, Australia; CSIRO's Data61, Australia; Nanyang Technological University, Singapore; TU Munich, Germany; UNSW, Australia)
Article Search
Automated and Accurate Token Transfer Identification and Its Applications in Cryptocurrency Security
Shuwei Song,
Ting Chen,
Ao Qiao,
Xiapu Luo,
Leqing Wang,
Zheyuan He,
Ting Wang,
Xiaodong Lin,
Peng He,
Wensheng Zhang, and
Xiaosong Zhang
(University of Electronic Science and Technology of China, China; Hong Kong Polytechnic University, China; Stony Brook University, USA; University of Guelph, Canada)
Article Search
Mitigating Emergent Malware Label Noise in DNN-Based Android Malware Detection
Haodong Li,
Xiao Cheng,
Guohan Zhang,
Guosheng Xu,
Guoai Xu, and
Haoyu Wang
(Beijing University of Posts and Telecommunications, China; UNSW, Australia; Harbin Institute of Technology, Shenzhen, China; Huazhong University of Science and Technology, China)
Article Search
Clone Detection for Smart Contracts: How Far Are We?
Zuobin Wang,
Zhiyuan Wan,
Yujing Chen,
Yun Zhang,
David Lo,
Difan Xie, and
Xiaohu Yang
(Zhejiang University, China; Hangzhou High-Tech Zone (Binjiang), China; Hangzhou City University, China; Singapore Management University, Singapore)
Article Search
Eliminating Backdoors in Neural Code Models for Secure Code Understanding
Weisong Sun,
Yuchen Chen,
Chunrong Fang,
Yebo Feng,
Yuan Xiao,
An Guo,
Quanjun Zhang,
Zhenyu Chen,
Baowen Xu, and
Yang Liu
(Nanyang Technological University, Singapore; Nanjing University, China)
Article Search
Understanding Debugging as Episodes: A Case Study on Performance Bugs in Configurable Software Systems
Max Weber,
Alina Mailach,
Sven Apel,
Janet Siegmund,
Raimund Dachselt, and
Norbert Siegmund
(Leipzig University, Germany; ScaDS.AI Dresden-Leipzig, Germany; Saarland Informatics Campus, Germany; Saarland University, Germany; Chemnitz University of Technology, Germany; Dresden University of Technology, Germany)
Article Search
Why the Proof Fails in Different Versions of Theorem Provers: An Empirical Study of Compatibility Issues in Isabelle
Xiaokun Luan,
David Sanan,
Zhe Hou,
Qiyuan Xu,
Chengwei Liu,
Yufan Cai,
Yang Liu, and
Meng Sun
(Peking University, China; Singapore Institute of Technology, Singapore; Griffith University, Australia; Nanyang Technological University, Singapore; China-Singapore International Joint Research Institute, China; National University of Singapore, Singapore)
Article Search
Artifacts Available
Beyond PEFT: Layer-Wise Optimization for More Effective and Efficient Large Code Model Tuning
Chaozheng Wang,
Jia Feng,
Shuzheng Gao,
Cuiyun Gao,
Zongjie Li,
Ting Peng,
Hailiang Huang,
Yuetang Deng, and
Michael Lyu
(Chinese University of Hong Kong, China; University of Electronic Science and Technology of China, China; Hong Kong University of Science and Technology, China; Tencent, China)
Article Search
CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift
Jiongchi Yu,
Xiaofei Xie,
Qiang Hu,
Bowen Zhang,
Ziming Zhao,
Yun Lin,
Lei Ma,
Ruitao Feng, and
Frank Liauw
(Singapore Management University, Singapore; Tianjin University, China; Zhejiang University, China; Shanghai Jiao Tong University, China; University of Tokyo, Japan; University of Alberta, Canada; Southern Cross University, Australia; Government Technology Agency of Singapore, Singapore)
Article Search
Software Fairness Dilemma: Is Bias Mitigation a Zero-Sum Game?
Zhenpeng Chen,
Xinyue Li,
Jie M. Zhang,
Weisong Sun,
Ying Xiao,
Tianlin Li,
Yiling Lou, and
Yang Liu
(Nanyang Technological University, Singapore; Peking University, China; King's College London, UK; Fudan University, China)
Article Search
RegTrieve: Reducing System-Level Regression Errors for Machine Learning Systems via Retrieval-Enhanced Ensemble
Junming Cao,
Xuwen Xiang,
Mingfei Cheng,
Bihuan Chen,
Xinyan Wang,
You Lu,
Chaofeng Sha,
Xiaofei Xie, and
Xin Peng
(Fudan University, China; Singapore Management University, Singapore)
Article Search
Info
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
Addi Malviya Thakur,
Reed Milewicz,
Mahmoud Jahanshahi,
Lavínia Paganini,
Bogdan Vasilescu, and
Audris Mockus
(University of Tennessee at Knoxville, USA; Oak Ridge National Laboratory, USA; Sandia National Laboratories, USA; Eindhoven University of Technology, Netherlands; Carnegie Mellon University, USA)
Article Search
Info
Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers
Lam Nguyen Tung,
Steven Cho,
Xiaoning Du,
Neelofar Neelofar,
Valerio Terragni,
Stefano Ruberto, and
Aldeida Aleti
(Monash University, Australia; University of Auckland, New Zealand; Royal Melbourne Institute of Technology, Australia; Joint Research Centre at the European Commission, Italy)
Article Search
VulPA: Detecting Semantically Recurring Vulnerabilities with Multi-object Typestate Analysis
Liqing Cao,
Haofeng Li,
Chenghang Shi,
Jie Lu,
Haining Meng,
Lian Li, and
Jingling Xue
(Institute of Computing Technology at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; Zhongguancun Laboratory, China; UNSW, Australia)
Article Search
Artifacts Available
AlphaTrans: A Neuro-Symbolic Compositional Approach for Repository-Level Code Translation and Validation
Ali Reza Ibrahimzada,
Kaiyao Ke,
Mrigank Pawagi,
Muhammad Salman Abid,
Rangeet Pan,
Saurabh Sinha, and
Reyhaneh Jabbarvand
(University of Illinois at Urbana-Champaign, USA; Indian Institute of Science, India; Cornell University, USA; IBM Research, USA)
Article Search
Artifacts Available
Medusa: A Framework for Collaborative Development of Foundation Models with Automated Parameter Ownership Assignment
Dezhi Ran,
Yuan Cao,
Yuzhe Guo,
Yuetong Li,
Mengzhou Wu,
Simin Chen,
Wei Yang, and
Tao Xie
(Peking University, China; Beijing Jiaotong University, China; University of Chicago, USA; University of Texas at Dallas, USA)
Article Search
Recasting Type Hints from WebAssembly Contracts
Kunsong Zhao,
Zihao Li,
Weimin Chen,
Xiapu Luo,
Ting Chen,
Guozhu Meng, and
Yajin Zhou
(Hong Kong Polytechnic University, China; University of Electronic Science and Technology of China, China; Institute of Information Engineering at Chinese Academy of Sciences, China; Zhejiang University, China)
Article Search
An Empirical Study of Code Clones from Commercial AI Code Generators
Weibin Wu,
Haoxuan Hu,
Zhaoji Fan,
Yitong Qiao,
Yizhan Huang,
Yichen Li,
Zibin Zheng, and
Michael Lyu
(Sun Yat-sen University, China; Zhuhai Key Laboratory of Trusted Large Language Models, China; Chinese University of Hong Kong, China)
Article Search
Understanding Industry Perspectives of Static Application Security Testing (SAST) Evaluation
Yuan Li,
Peisen Yao,
Kan Yu,
Chengpeng Wang,
Yaoyang Ye,
Song Li,
Meng Luo,
Yepang Liu, and
Kui Ren
(Zhejiang University, China; Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, China; Ant Group, China; Hong Kong University of Science and Technology, China; Southern University of Science and Technology, China)
Article Search
proc time: 31.48