Default Cover Image

2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)

Sept. 21 2020 to Sept. 25 2020

Melbourne

ISBN: 978-1-4503-6768-4

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xxi
Message from the ChairsFreely available from IEEE.pp. xxii-xxii
Organizing CommitteeFreely available from IEEE.pp. xxvii-xxix
Programme Committee - Research TrackFreely available from IEEE.pp. xxx-xxxix
Platinum SponsorFreely available from IEEE.pp. 1-1
Safety and Robustness for Deep Learning with Provable GuaranteesFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Is Software Engineering Research Addressing Software Engineering Problems? (Keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 4-5
Accelerating All-SAT Computation with Short Blocking ClausesFull-text access may be available. Sign in or learn about subscription options.pp. 6-17
A Predictive Analysis for Detecting Deadlock in MPI ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 18-28
Learning to Handle ExceptionsFull-text access may be available. Sign in or learn about subscription options.pp. 29-41
Enhanced Compiler Bug Isolation via Memoized SearchFull-text access may be available. Sign in or learn about subscription options.pp. 78-89
M3: Semantic API MigrationsFull-text access may be available. Sign in or learn about subscription options.pp. 90-102
The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux KernelFull-text access may be available. Sign in or learn about subscription options.pp. 103-114
Pending Constraints in Symbolic Execution for Better Exploration and SeedingFull-text access may be available. Sign in or learn about subscription options.pp. 115-126
Verified from Scratch: Program Analysis for Learners' ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 150-162
Interval Change-Point Detection for Runtime Probabilistic Model CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 163-174
Demystifying Diehard Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 187-198
UI Obfuscation and Its Effects on Automated UI Analysis for Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 199-210
Subdomain-Based Generality-Aware DebloatingFull-text access may be available. Sign in or learn about subscription options.pp. 224-236
Synthesis of Infinite-State Systems with Random BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 250-261
Demystifying Loops in Smart ContractsFull-text access may be available. Sign in or learn about subscription options.pp. 262-274
Patching as Translation: the Data and the MetaphorFull-text access may be available. Sign in or learn about subscription options.pp. 275-286
Hybrid Deep Neural Networks to Infer State Models of Black-Box SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 299-311
Representing and Reasoning about Dynamic CodeFull-text access may be available. Sign in or learn about subscription options.pp. 312-323
A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open ForumFull-text access may be available. Sign in or learn about subscription options.pp. 336-348
Retrieve and Refine: Exemplar-based Neural Comment GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 349-360
Where Shall We Log? Studying and Suggesting Logging Locations in Code BlocksFull-text access may be available. Sign in or learn about subscription options.pp. 361-372
Stay Professional and Efficient: Automatically Generate Titles for Your Bug ReportsFull-text access may be available. Sign in or learn about subscription options.pp. 385-397
Owl Eyes: Spotting UI Display Issues via Visual UnderstandingFull-text access may be available. Sign in or learn about subscription options.pp. 398-409
Multiple-Boundary Clustering and Prioritization to Promote Neural Network RetrainingFull-text access may be available. Sign in or learn about subscription options.pp. 410-422
Marble: Model-based Robustness Analysis of Stateful Deep Learning SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 423-435
MockSniffer: Characterizing and Recommending Mocking Decisions for Unit TestsFull-text access may be available. Sign in or learn about subscription options.pp. 436-447
Defect Prediction Guided Search-Based Software TestingFull-text access may be available. Sign in or learn about subscription options.pp. 448-460
API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 461-472
Multi-task Learning based Pre-trained Language Model for Code CompletionFull-text access may be available. Sign in or learn about subscription options.pp. 473-485
Audee: Automated Testing for Deep Learning FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 486-498
Continuous ComplianceFull-text access may be available. Sign in or learn about subscription options.pp. 511-523
CoFI: Consistency-Guided Fault Injection for Cloud SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 536-547
Automatic Extraction of Cause-Effect-Relations from Requirements ArtifactsFull-text access may be available. Sign in or learn about subscription options.pp. 561-572
BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 573-584
Automating Just-In-Time Comment UpdatingFull-text access may be available. Sign in or learn about subscription options.pp. 585-597
Automated Implementation of Windows-related Security-Configuration GuidesFull-text access may be available. Sign in or learn about subscription options.pp. 598-610
Identifying Software Performance Changes Across Variants and VersionsFull-text access may be available. Sign in or learn about subscription options.pp. 611-622
Just-In-Time Reactive SynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 635-646
JISET: JavaScript IR-based Semantics Extraction ToolchainFull-text access may be available. Sign in or learn about subscription options.pp. 647-658
FlashRegex: Deducing Anti-ReDoS Regexes from ExamplesFull-text access may be available. Sign in or learn about subscription options.pp. 659-671
Inferring and Applying Def-Use Like Configuration Couplings in Deployment DescriptorsFull-text access may be available. Sign in or learn about subscription options.pp. 672-683
Mastering Uncertainty in Performance Estimations of Configurable Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 684-696
Team Discussions and Dynamics During DevOps Tool Adoptions in OSS ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 697-708
TestMC: Testing Model Counters using Differential and Metamorphic TestingFull-text access may be available. Sign in or learn about subscription options.pp. 709-721
Exploring the Architectural Impact of Possible Dependencies in Python SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 758-770
NEURODIFF: Scalable Differential Verification of Neural Networks using Fine-Grained ApproximationFull-text access may be available. Sign in or learn about subscription options.pp. 784-796
Predicting Code Context Models for Software Development TasksFull-text access may be available. Sign in or learn about subscription options.pp. 809-820
SCDetector: Software Functional Clone Detection Based on Semantic Tokens AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 821-833
Generating Concept based API Element Comparison Using a Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 834-845
Multiplex Symbolic Execution: Exploring Multiple Paths by Solving OnceFull-text access may be available. Sign in or learn about subscription options.pp. 846-857
Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 858-870
Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 871-882
OCoR: An Overlapping-Aware Code RetrieverFull-text access may be available. Sign in or learn about subscription options.pp. 883-894
Understanding Performance Concerns in the API Documentation of Data Science LibrariesFull-text access may be available. Sign in or learn about subscription options.pp. 895-906
On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 907-918
CCGraph: a PDG-based code clone detector with approximate graph matchingFull-text access may be available. Sign in or learn about subscription options.pp. 931-942
Towards Generating Thread-Safe Classes AutomaticallyFull-text access may be available. Sign in or learn about subscription options.pp. 943-955
No Strings Attached: An Empirical Study of String-related Software BugsFull-text access may be available. Sign in or learn about subscription options.pp. 956-967
Automated Patch Correctness Assessment: How Far are We?Full-text access may be available. Sign in or learn about subscription options.pp. 968-980
Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model TransformationsFull-text access may be available. Sign in or learn about subscription options.pp. 993-1003
Trace-Checking Signal-based Temporal Properties: A Model-Driven ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1004-1015
Attend and Represent: A Novel View on Algorithm Selection for Software VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 1016-1028
Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 1041-1052
Metamorphic Object Insertion for Testing Object Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1053-1065
Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 1066-1077
Synthesis-Based Resolution of Feature Interactions in Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1090-1102
MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 1103-1115
Prober: Practically Defending Overflows with Page ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 1116-1128
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1129-1140
Showing 100 out of 165