skip to main content
Volume 33, Issue 5June 2024
Editor:
  • Mauro Pezzè
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1049-331X
EISSN:1557-7392
Reflects downloads up to 15 Sep 2024Bibliometrics
Skip Table Of Content Section
SECTION: New Frontiers of Software Engineering
research-article
Open Access
Communicating Study Design Trade-offs in Software Engineering
Article No.: 112, Pages 1–10https://doi.org/10.1145/3649598

Reflecting on the limitations of a study is a crucial part of the research process. In software engineering studies, this reflection is typically conveyed through discussions of study limitations or threats to validity. In current practice, such ...

SECTION: Regular Papers
research-article
Open Access
Learning Failure-Inducing Models for Testing Software-Defined Networks
Article No.: 113, Pages 1–25https://doi.org/10.1145/3641541

Software-defined networks (SDN) enable flexible and effective communication systems that are managed by centralized software controllers. However, such a controller can undermine the underlying communication network of an SDN-based system and thus must be ...

research-article
sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts
Article No.: 114, Pages 1–55https://doi.org/10.1145/3641846

Smart contracts are becoming appealing targets for hackers because of the vast amount of cryptocurrencies under their control. Asset loss due to the exploitation of smart contract codes has increased significantly in recent years. To guarantee that smart ...

research-article
Try with Simpler - An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection
Article No.: 115, Pages 1–27https://doi.org/10.1145/3644386

With the rapid development of deep learning (DL), the recent trend of log-based anomaly detection focuses on extracting semantic information from log events (i.e., templates of log messages) and designing more advanced DL models for anomaly detection. ...

research-article
Open Access
Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues
Article No.: 116, Pages 1–26https://doi.org/10.1145/3643674

Since its introduction in November 2022, ChatGPT has rapidly gained popularity due to its remarkable ability in language understanding and human-like responses. ChatGPT, based on GPT-3.5 architecture, has shown great promise for revolutionizing various ...

research-article
An Empirical Analysis of Issue Templates Usage in Large-Scale Projects on GitHub
Article No.: 117, Pages 1–28https://doi.org/10.1145/3643673

GitHub Issues is a widely used issue tracking tool in open-source software projects. Originally designed with broad flexibility, its lack of standardization led to incomplete issue reports, impeding software development and maintenance efficiency. To ...

research-article
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing
Article No.: 118, Pages 1–31https://doi.org/10.1145/3647994

Skeletal program enumeration (SPE) can generate a great number of test programs for validating the correctness of compilers or interpreters. The classic SPE generates programs by exhaustively enumerating all possible variable usage patterns into a given ...

research-article
Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search
Article No.: 119, Pages 1–29https://doi.org/10.1145/3644389

Many existing static analysis algorithms suffer from cubic bottlenecks because of the need to compute a dynamic transitive closure (DTC). For the first time, this article studies the quantum speedups on searching subtasks in DTC-based static analysis ...

research-article
Open Access
Non-Autoregressive Line-Level Code Completion
Article No.: 120, Pages 1–34https://doi.org/10.1145/3649594

Software developers frequently use code completion tools to accelerate software development by suggesting the following code elements. Researchers usually employ AutoRegressive (AR) decoders to complete code sequences in a left-to-right, token-by-token ...

research-article
Open Access
Precisely Extracting Complex Variable Values from Android Apps
Article No.: 121, Pages 1–56https://doi.org/10.1145/3649591

Millions of users nowadays rely on their smartphones to process sensitive data through apps from various vendors and sources. Therefore, it is vital to assess these apps for security vulnerabilities and privacy violations. Information such as to which ...

research-article
DinoDroid: Testing Android Apps Using Deep Q-Networks
Article No.: 122, Pages 1–24https://doi.org/10.1145/3652150

The large demand of mobile devices creates significant concerns about the quality of mobile applications (apps). Developers need to guarantee the quality of mobile apps before it is released to the market. There have been many approaches using different ...

research-article
Generating Python Type Annotations from Type Inference: How Far Are We?
Article No.: 123, Pages 1–38https://doi.org/10.1145/3652153

In recent years, dynamic languages such as Python have become popular due to their flexibility and productivity. The lack of static typing makes programs face the challenges of fixing type errors, early bug detection, and code understanding. To alleviate ...

SECTION: Continuous Special Section: AI and SE
research-article
Open Access
Prompt Sapper: A LLM-Empowered Production Tool for Building AI Chains
Article No.: 124, Pages 1–24https://doi.org/10.1145/3638247

The emergence of foundation models, such as large language models (LLMs) GPT-4 and text-to-image models DALL-E, has opened up numerous possibilities across various domains. People can now use natural language (i.e., prompts) to communicate with AI to ...

research-article
Machine Translation Testing via Syntactic Tree Pruning
Article No.: 125, Pages 1–39https://doi.org/10.1145/3640329

Machine translation systems have been widely adopted in our daily life, making life easier and more convenient. Unfortunately, erroneous translations may result in severe consequences, such as financial losses. This requires to improve the accuracy and ...

research-article
Open Access
On the Reliability and Explainability of Language Models for Program Generation
Article No.: 126, Pages 1–26https://doi.org/10.1145/3641540

Recent studies have adopted pre-trained language models, such as CodeT5 and CodeGPT, for automated program generation tasks like code generation, repair, and translation. Numerous language model based approaches have been proposed and evaluated on various ...

research-article
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors
Article No.: 127, Pages 1–33https://doi.org/10.1145/3641543

Vulnerability detectors based on deep learning (DL) models have proven their effectiveness in recent years. However, the shroud of opacity surrounding the decision-making process of these detectors makes it difficult for security analysts to comprehend. ...

research-article
RAPID: Zero-Shot Domain Adaptation for Code Search with Pre-Trained Models
Article No.: 128, Pages 1–35https://doi.org/10.1145/3641542

Code search, which refers to the process of identifying the most relevant code snippets for a given natural language query, plays a crucial role in software maintenance. However, current approaches heavily rely on labeled data for training, which results ...

research-article
Open Access
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks
Article No.: 129, Pages 1–35https://doi.org/10.1145/3644387

As a new programming paradigm, deep neural networks (DNNs) have been increasingly deployed in practice, but the lack of robustness hinders their applications in safety-critical domains. While there are techniques for verifying DNNs with formal guarantees, ...

research-article
Open Access
Supporting Safety Analysis of Image-processing DNNs through Clustering-based Approaches
Article No.: 130, Pages 1–48https://doi.org/10.1145/3643671

The adoption of deep neural networks (DNNs) in safety-critical contexts is often prevented by the lack of effective means to explain their results, especially when they are erroneous. In our previous work, we proposed a white-box approach (HUDD) and a ...

research-article
Analyzing and Detecting Information Types of Developer Live Chat Threads
Article No.: 131, Pages 1–32https://doi.org/10.1145/3643677

Online chatrooms serve as vital platforms for information exchange among software developers. With multiple developers engaged in rapid communication and diverse conversation topics, the resulting chat messages often manifest complexity and lack ...

research-article
Open Access
Test Input Prioritization for 3D Point Clouds
Article No.: 132, Pages 1–44https://doi.org/10.1145/3643676

3D point cloud applications have become increasingly prevalent in diverse domains, showcasing their efficacy in various software systems. However, testing such applications presents unique challenges due to the high-dimensional nature of 3D point cloud ...

research-article
KADEL: Knowledge-Aware Denoising Learning for Commit Message Generation
Article No.: 133, Pages 1–32https://doi.org/10.1145/3643675

Commit messages are natural language descriptions of code changes, which are important for software evolution such as code understanding and maintenance. However, previous methods are trained on the entire dataset without considering the fact that a ...

SECTION: Continuous Special Section: Security and SE
research-article
Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories
Article No.: 134, Pages 1–28https://doi.org/10.1145/3649590

The lack of comprehensive sources of accurate vulnerability data represents a critical obstacle to studying and understanding software vulnerabilities (and their corrections). In this article, we present an approach that combines heuristics stemming from ...

SECTION: Continuous Special Section: Human-Centric SE
research-article
Open Access
Navigating the Complexity of Generative AI Adoption in Software Engineering
Article No.: 135, Pages 1–50https://doi.org/10.1145/3652154

This article explores the adoption of Generative Artificial Intelligence (AI) tools within the domain of software engineering, focusing on the influencing factors at the individual, technological, and social levels. We applied a convergent mixed-methods ...

research-article
Open Access
Lessons Learned from Developing a Sustainability Awareness Framework for Software Engineering Using Design Science
Article No.: 136, Pages 1–39https://doi.org/10.1145/3649597

To foster a sustainable society within a sustainable environment, we must dramatically reshape our work and consumption activities, most of which are facilitated through software. Yet, most software engineers hardly consider the effects on the ...

SECTION: Survey
survey
Open Access
Fairness Testing: A Comprehensive Survey and Analysis of Trends
Article No.: 137, Pages 1–59https://doi.org/10.1145/3652155

Unfair behaviors of Machine Learning (ML) software have garnered increasing attention and concern among software engineers. To tackle this issue, extensive research has been dedicated to conducting fairness testing of ML software, and this article offers ...

SECTION: Registered Paper
research-article
Fine-grained Coverage-based Fuzzing
Article No.: 138, Pages 1–41https://doi.org/10.1145/3587158

Fuzzing is a popular software testing method that discovers bugs by massively feeding target applications with automatically generated inputs. Many state-of-the-art fuzzers use branch coverage as a feedback metric to guide the fuzzing process. The fuzzer ...

SECTION: RCR Report
Fine-grained Coverage-based Fuzzing - RCR Report
Article No.: 139, Pages 1–4https://doi.org/10.1145/3649592

This is the RCR report of the artifact for the article “Fine-grained Coverage-based Fuzzing.” This report contains scripts and pre-build binary programs to reproduce the results presented in the main article. The artifact is released on Zenodo with DOI: ...

Subjects

Comments