On the robustness of code generation techniques: An empirical study on github copilot

A Mastropaolo, L Pascarella… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Software engineering research has always being concerned with the improvement of code
completion approaches, which suggest the next tokens a developer will likely type while …

Using pre-trained models to boost code review automation

R Tufano, S Masiero, A Mastropaolo… - Proceedings of the 44th …, 2022 - dl.acm.org
Code review is a practice widely adopted in open source and industrial projects. Given the
non-negligible cost of such a process, researchers started investigating the possibility of …

Automating code-related tasks through transformers: The impact of pre-training

R Tufano, L Pascarella, G Bavota - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Transformers have gained popularity in the software engineering (SE) literature. These deep
learning models are usually pre-trained through a self-supervised objective, meant to …

Empirical analysis of security vulnerabilities in python packages

M Alfadel, DE Costa, E Shihab - Empirical Software Engineering, 2023 - Springer
Software ecosystems play an important role in modern software development, providing an
open platform of reusable packages that speed up and facilitate development tasks …

On the use of github actions in software development repositories

A Decan, T Mens, PR Mazrae… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
GitHub Actions was introduced in 2019 and constitutes an integrated alternative to CI/CD
services for GitHub repositories. The deep integration with GitHub allows repositories to …

An empirical study on the usage of transformer models for code completion

M Ciniselli, N Cooper, L Pascarella… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Code completion aims at speeding up code writing by predicting the next code token (s) the
developer is likely to write. Works in this field focused on improving the accuracy of the …

Everyone for themselves? a qualitative study about individual security setups of open source software contributors

S Amft, S Höltervennhoff, R Panskus… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
To increase open-source software supply chain security, protecting the development
environment of contributors against attacks is crucial. For example, contributors must protect …

Using deep learning to generate complete log statements

A Mastropaolo, L Pascarella, G Bavota - Proceedings of the 44th …, 2022 - dl.acm.org
Logging is a practice widely adopted in several phases of the software lifecycle. For
example, during software development log statements allow engineers to verify and debug …

Automated variable renaming: are we there yet?

A Mastropaolo, E Aghajani, L Pascarella… - Empirical Software …, 2023 - Springer
Identifiers, such as method and variable names, form a large portion of source code.
Therefore, low-quality identifiers can substantially hinder code comprehension. To support …

On the outdatedness of workflows in the GitHub Actions ecosystem

A Decan, T Mens, HO Delicheh - Journal of Systems and Software, 2023 - Elsevier
GitHub Actions was introduced as a way to automate CI/CD workflows in GitHub, the largest
social coding platform. Thanks to its deep integration into GitHub, GitHub Actions can be …