SANER 2019
2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering (SANER)
Powered by
Conference Publishing Consulting

2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering (SANER), February 24-27, 2019, Hangzhou, China

SANER 2019 – Proceedings

Contents - Abstracts - Authors

Frontmatter

Title Page
Message from the Chairs
Committees
Sponsors

Keynotes

Software Engineering in a Data Science Future (Keynote)
Ahmed E. Hassan
(Queen's University, Canada)
Does Your Software Value What You Value? (Keynote)
Jon Whittle
(Monash University, Australia)
Forward and Backward Traceability: Requirements and Challenges (Keynote)
Zhi Jin
(Peking University, China)

Research Papers

Software Multiple-Level Change Detection Based on Two-Step MPAT Matching
Tong Wang, Dongdong Wang, Ying Zhou, and Bixin Li
(Southeast University, China)
Pruning the AST with Hunks to Speed up Tree Differencing
Chunhua Yang and E. James Whitehead
(QILU University of Technology, China; University of California at Santa Cruz, USA)
Expressions of Sentiments during Code Reviews: Male vs. Female
Rajshakhar Paul, Amiangshu Bosu, and Kazi Zakia Sultana
(Wayne State University, USA; Montclair University, USA)
A Study on the Interplay between Pull Request Review and Continuous Integration Builds
Fiorella Zampetti, Gabriele Bavota, Gerardo Canfora, and Massimiliano Di Penta
(University of Sannio, Italy; USI Lugano, Switzerland)
Confusion in Code Reviews: Reasons, Impacts, and Coping Strategies
Felipe Ebert, Fernando Castor, Nicole Novielli, and Alexander Serebrenik
(Federal University of Pernambuco, Brazil; University of Bari, Italy; Eindhoven University of Technology, Netherlands)
Info
Deep Review Sharing
Chenkai Guo, Dengrong Huang, Naipeng Dong, Quanqi Ye, Jing Xu, Yaqing Fan, Hui Yang, and Yifan Xu
(Nankai University, China; National University of Singapore, Singapore; Advanced Digital Sciences Center, Singapore)
A Comparative Study of Software Bugs in Micro-clones and Regular Code Clones
Judith F. Islam, Manishankar Mondal, and Chanchal K. Roy
(University of Saskatchewan, Canada)
On Precision of Code Clone Detection Tools
Farima Farmahinifarahani, Vaibhav Saini, Di Yang, Hitesh Sajnani, and Cristina V. Lopes
(University of California at Irvine, USA; Microsoft, USA)
Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection
Lutz Büch and Artur Andrzejak
(University of Heidelberg, Germany)
Fuzzing Program Logic Deeply Hidden in Binary Program Stages
Yanhao Wang, Zheng Leong Chua, Yuwei Liu, Purui Su, and Zhenkai Liang
(Institute of Software at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; National University of Singapore, Singapore)
How Stable Are Eclipse Application Framework Internal Interfaces?
John Businge, Simon Kawuma, Moses Openja, Engineer Bainomugisha, and Alexander Serebrenik
(Mbarara University of Science and Technology, Uganda; Makerere University, Uganda; Eindhoven University of Technology, Netherlands)
Info
Unveiling Exception Handling Guidelines Adopted by Java Developers
Hugo Melo, Roberta Coelho, and Christoph Treude
(Federal University of Rio Grande do Norte, Brazil; University of Adelaide, Australia)
Migrating to GraphQL: A Practical Assessment
Gleison Brito, Thais Mombach, and Marco Tulio Valente
(Federal University of Minas Gerais, Brazil)
Are Refactorings to Blame? An Empirical Study of Refactorings in Merge Conflicts
Mehran Mahmoudi, Sarah Nadi, and Nikolaos Tsantalis
(University of Alberta, Canada; Concordia University, Canada)
Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context
Renhao Xiong and Bixin Li
(Southeast University, China)
Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis
Bryan J. Muscedere, Robert Hackman, Davood Anbarnam, Joanne M. Atlee, Ian J. Davis, and Michael W. Godfrey
(University of Waterloo, Canada)
Mining Cross-Task Artifact Dependencies from Developer Interactions
Usman Ashraf, Christoph Mayr-Dorn, and Alexander Egyed
(JKU Linz, Austria)
Info
A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers
Cong Chen, Yulong Yang, Lin Yang, and Kang Zhang
(Tianjin University, China; University of Texas at Dallas, USA)
Feature Maps: A Comprehensible Software Representation for Design Pattern Detection
Hannes Thaller, Lukas Linsbauer, and Alexander Egyed
(JKU Linz, Austria)
Reformulating Queries for Duplicate Bug Report Detection
Oscar Chaparro, Juan Manuel Florez, Unnati Singh, and Andrian Marcus
(University of Texas at Dallas, USA)
Info
Identifying Redundancies in Fork-based Development
Luyao Ren, Shurui Zhou, Christian Kästner, and Andrzej Wąsowski
(Peking University, China; Carnegie Mellon University, USA; IT University of Copenhagen, Denmark)
Systematic Comprehension for Developer Reply in Mobile System Forum
Chenkai Guo, Weijing Wang, Yanfeng Wu, Naipeng Dong, Quanqi Ye, Jing Xu, and Sen Zhang
(Nankai University, China; National University of Singapore, Singapore; Advanced Digital Sciences Center, Singapore)
Improving Model Inference in Industry by Combining Active and Passive Learning
Nan Yang, Kousar Aslam, Ramon Schiffelers, Leonard Lensink, Dennis Hendriks, Loek Cleophas, and Alexander Serebrenik
(Eindhoven University of Technology, Netherlands; ASML, Netherlands; ESI/TNO, Netherlands)
Towards Understandable Guards of Extracted State Machines from Embedded Software
Wasim Said, Jochen Quante, and Rainer Koschke
(Robert Bosch, Germany; University of Bremen, Germany)
Mining Specifications from Documentation using a Crowd
Peng Sun, Chris Brown, Ivan Beschastnikh, and Kathryn T. Stolee
(Iowa State University, USA; North Carolina State University, USA; University of British Columbia, Canada)
Studying Android App Popularity by Cross-Linking GitHub and Google Play Store
John Businge, Moses Openja, David Kavaler, Engineer Bainomugisha, Foutse Khomh, and Vladmir Filkov
(Mbarara University of Science and Technology, Uganda; University of California at Davis, USA; Makerere University, Uganda; Polytechnique Montréal, Canada)
An Empirical Study of Learning to Rank Techniques for Effort-Aware Defect Prediction
Xiao Yu, Kwabena Ebo Bennin, Jin Liu, Jacky Wai Keung, Xiaofei Yin, and Zhou Xu
(Wuhan University, China; City University of Hong Kong, China; Fudan University, China)
COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web Application
Hiroyuki Kirinuki, Haruto Tanno, and Katsuyuki Natsukawa
(NTT, Japan)
A Comparative Study of Android Repackaged Apps Detection Techniques
Xian Zhan, Tao Zhang, and Yutian Tang
(Hong Kong Polytechnic University, China; Harbin Engineering University, China)
Info
Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps
Yangyu Hu, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, and Ren He
(Beijing University of Posts and Telecommunications, China; Monash University, Australia; Peking University, China)
AppCommune: Automated Third-Party Libraries De-duplicating and Updating for Android Apps
Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, and Dawu Gu
(Shanghai Jiao Tong University, China)
Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps
Wenjie Li, Yanyan Jiang, Chang Xu, Yepang Liu, Xiaoxing Ma, and Jian Lü
(Nanjing University, China; Southern University of Science and Technology, China)
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers
Qiu-Liang Chen, Jia-Ju Bai, Zu-Ming Jiang, Julia Lawall, and Shi-Min Hu
(Tsinghua University, China; Sorbonne University, France; Inria, France; LIP6, France)
An Empirical Study of Messaging Passing Concurrency in Go Projects
Nicolas Dilley and Julien Lange
(University of Kent, UK)
Info
A Splitting Strategy for Testing Concurrent Programs
Xiaofang Qi and Huayang Zhou
(Southeast University, China)
Understanding Node Change Bugs for Distributed Systems
Jie Lu, Liu Chen, Lian Li, and Xiaobing Feng
(Institute of Computing Technology at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
A Neural Model for Method Name Generation from Functional Description
Sa Gao, Chunyang Chen, Zhenchang Xing, Yukun Ma, Wen Song, and Shang-Wei Lin
(Nanyang Technological University, Singapore; Monash University, Australia; Australian National University, Australia)
Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification
Nghi D. Q. Bui, Yijun Yu, and Lingxiao Jiang
(Singapore Management University, Singapore; Open University, UK)
DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery
Rui Xie, Long Chen, Wei Ye, Zhiyu Li, Tianxiang Hu, Dongdong Du, and Shikun Zhang
(Peking University, China)
CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks
Zhuo Zhang, Yan Lei, Xiaoguang Mao, and Panpan Li
(National University of Defense Technology, China; Chongqing University, China)
Avatar: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Kui Liu, Anil Koyuncu, Dongsun Kim, and Tegawendé F. Bissyandé
(University of Luxembourg, Luxembourg)
Bears: An Extensible Java Bug Benchmark for Automatic Program Repair Studies
Fernanda Madeiral, Simon Urli, Marcelo Maia, and Martin Monperrus
(Federal University of Uberlândia, Brazil; Inria, France; University of Lille, France; KTH, Sweden)
Sorting and Transforming Program Repair Ingredients via Deep Learning Code Similarities
Martin White, Michele Tufano, Matías Martínez, Martin Monperrus, and Denys Poshyvanyk
(College of William and Mary, USA; Polytechnic University of Hauts-de-France, France; KTH, Sweden)
Info
On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs
Ahmed Zerouali, Tom Mens, Gregorio Robles, and Jesus M. Gonzalez-Barahona
(University of Mons, Belgium; Universidad Rey Juan Carlos, Spain)
Exploring Regular Expression Evolution
Peipei Wang, Gina R. Bai, and Kathryn T. Stolee
(North Carolina State University, USA)

RENE Track

Mining Scala Framework Extensions for Recommendation Patterns
Yunior Pacheco, Jonas De Bleser, Tim Molderez, Dario Di Nucci, Wolfgang De Meuter, and Coen De Roover
(Vrije Universiteit Brussel, Belgium; Pinar del Rio University, Cuba)
Info
Reuse (or Lack Thereof) in Travis CI Specifications: An Empirical Study of CI Phases and Commands
Puneet Kaur Sidhu, Gunter Mussbacher, and Shane McIntosh
(McGill University, Canada)
Is Self-Admitted Technical Debt a Good Indicator of Architectural Divergences?
Giancarlo Sierra, Ahmad Tahmid, Emad Shihab, and Nikolaos Tsantalis
(Concordia University, Canada)

Industry Track

Identifying Feature Clones: An Industrial Case Study
Muslim Chochlov, Michael English, Jim Buckley, Daniel Ilie, and Maria Scanlon
(University of Limerick, Ireland; Wood, Ireland)
Towards Generating Cost-Effective Test-Suite for Ethereum Smart Contract
Xingya Wang, Haoran Wu, Weisong Sun, and Yuan Zhao
(Nanjing University, China)
EVM*: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine
Fuchen Ma, Ying Fu, Meng Ren, Mingzhe Wang, Yu Jiang, Kaixiang Zhang, Huizhong Li, and Xiang Shi
(Beijing University of Posts and Telecommunications, China; Tsinghua University, China; Sun Yat-sen University, China; WeBank, China)
Testing the Message Flow of Android Auto Apps
Yu Zhang, Xi Deng, Jun Yan, Hang Su, and Hongyu Gao
(Beijing University of Technology, China; Institute of Software at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
Open-Source License Violations of Binary Software at Large Scale
Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, and Wei Huo
(Institute of Information Engineering at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; National Computer Network Emergency Response Technical Team, China)
Qualify First! A Large Scale Modernisation Report
Leszek Włodarski, Boris Pereira, Ivan Povazan, Johan Fabry, and Vadim Zaytsev
(mBank, Poland; Raincode Labs, Belgium)
Challenges of SonarQube Plug-In Maintenance
Bence Barta, Günter Manz, István Siket, and Rudolf Ferenc
(University of Szeged, Hungary; FrontEndART Software, Hungary)
Video Info
GUI Migration using MDE from GWT to Angular 6: An Industrial Case
Benoît Verhaeghe, Anne Etien, Nicolas Anquetil, Abderrahmane Seriai, Laurent Deruelle, Stéphane Ducasse, and Mustapha Derras
(University of Lille, France; CNRS, France; Inria, France; Berger-Levrault, France)

ERA Track

Program State Coverage: A Test Coverage Metric Based on Executed Program States
Khashayar Etemadi Someoliayi, Sajad Jalali, Mostafa Mahdieh, and Seyed-Hassan Mirian-Hosseinabadi
(Sharif University of Technology, Iran)
On the Diversity of Software Package Popularity Metrics: An Empirical Study of npm
Ahmed Zerouali, Tom Mens, Gregorio Robles, and Jesus M. Gonzalez-Barahona
(University of Mons, Belgium; Universidad Rey Juan Carlos, Spain)
On the Impact of Refactoring Operations on Code Naturalness
Bin Lin, Csaba Nagy, Gabriele Bavota, and Michele Lanza
(USI Lugano, Switzerland)
Knowledge Graphing Git Repositories: A Preliminary Study
Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, and John Grundy
(Beijing University of Posts and Telecommunications, China; Harbin Institute of Technology, China; Monash University, Australia)
Should You Consider Adware as Malware in Your Study?
Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, and Jacques Klein
(University of Luxembourg, Luxembourg; Monash University, Australia)
Please Help! A Preliminary Study on the Effect of Social Proof and Legitimization of Paltry Contributions in Donations to OSS
Ugo Yukizawa, Masateru Tsunoda, and Amjed Tahir
(Kindai University, Japan; Massey University, New Zealand)
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems
Lei Ma, Felix Juefei-Xu, Minhui Xue, Bo Li, Li Li, Yang Liu, and Jianjun Zhao
(Harbin Institute of Technology, China; Carnegie Mellon University, USA; Macquarie University, Australia; University of Illinois at Urbana-Champaign, USA; Monash University, Australia; Nanyang Technological University, Singapore; Kyushu University, Japan)
On the Impact of Outdated and Vulnerable Javascript Packages in Docker Images
Ahmed Zerouali, Valerio Cosentino, Tom Mens, Gregorio Robles, and Jesus M. Gonzalez-Barahona
(University of Mons, Belgium; Bitergia, Spain; Universidad Rey Juan Carlos, Spain)

Tool Demonstrations

GuardiaML: Machine Learning-Assisted Dynamic Information Flow Control
Angel Luis Scull Pupo, Jens Nicolay, Kyriakos Efthymiadis, Ann Nowé, Coen De Roover, and Elisa Gonzalez Boix
(Vrije Universiteit Brussel, Belgium)
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps
Davide Pizzolotto, Roberto Fellin, and Mariano Ceccato
(Fondazione Bruno Kessler, Italy; University of Trento, Italy)
Madoop: Improving Browser-Based Volunteer Computing Based on Modern Web Technologies
Hiroyuki Matsuo, Shinsuke Matsumoto, Yoshiki Higo, and Shinji Kusumoto
(Osaka University, Japan)
Info
Automating Performance Antipattern Detection and Software Refactoring in UML Models
Davide Arcelli, Vittorio Cortellessa, and Daniele Di Pompeo
(University of L'Aquila, Italy)
Video
ICSD: Interactive Visual Support for Understanding Code Control Structure
Ahmad Jbara, Mousa Agbaria, Alon Adoni, Malek Jabareen, and Ameen Yasin
(Netanya Academic College, Israel; University of Connecticut, USA)
GoCity: Code City for Go
Rodrigo Brito, Aline Brito, Gleison Brito, and Marco Tulio Valente
(Federal University of Minas Gerais, Brazil)
Info

proc time: 0.08