A survey of performance optimization for mobile applications

M Hort, M Kechagia, F Sarro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To ensure user satisfaction and success of mobile applications, it is important to provide
highly performant applications. This is particularly important for resource-constrained …

A survey on developer-centred security

M Tahaei, K Vaniea - 2019 IEEE European Symposium on …, 2019 - ieeexplore.ieee.org
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …

An empirical study on the effectiveness of static C code analyzers for vulnerability detection

S Lipp, S Banescu, A Pretschner - Proceedings of the 31st ACM …, 2022 - dl.acm.org
Static code analysis is often used to scan source code for security vulnerabilities. Given the
wide range of existing solutions implementing different analysis techniques, it is very …

Getafix: Learning to fix bugs automatically

J Bader, A Scott, M Pradel, S Chandra - Proceedings of the ACM on …, 2019 - dl.acm.org
Static analyzers help find bugs early by warning about recurring bug categories. While fixing
these bugs still remains a mostly manual task in practice, we observe that fixes for a specific …

Do you still need a manual smart contract audit?

I David, L Zhou, K Qin, D Song, L Cavallaro… - arxiv preprint arxiv …, 2023 - arxiv.org
We investigate the feasibility of employing large language models (LLMs) for conducting the
security audit of smart contracts, a traditionally time-consuming and costly process. Our …

Trustworthy and synergistic artificial intelligence for software engineering: Vision and roadmaps

D Lo - 2023 IEEE/ACM International Conference on Software …, 2023 - ieeexplore.ieee.org
For decades, much software engineering research has been dedicated to devising
automated solutions aimed at enhancing developer productivity and elevating software …

Root causing flaky tests in a large-scale industrial setting

W Lam, P Godefroid, S Nath, A Santhiar… - Proceedings of the 28th …, 2019 - dl.acm.org
In today's agile world, developers often rely on continuous integration pipelines to help build
and validate their changes by executing tests in an efficient manner. One of the significant …

An empirical study of automated vulnerability localization with large language models

J Zhang, C Wang, A Li, W Sun, C Zhang, W Ma… - arxiv preprint arxiv …, 2024 - arxiv.org
Recently, Automated Vulnerability Localization (AVL) has attracted much attention, aiming to
facilitate diagnosis by pinpointing the lines of code responsible for discovered …

A large-scale study of usability criteria addressed by static analysis tools

M Nachtigall, M Schlichtig, E Bodden - Proceedings of the 31st ACM …, 2022 - dl.acm.org
Static analysis tools support developers in detecting potential coding issues, such as bugs
or vulnerabilities. Research on static analysis emphasizes its technical challenges but also …

Counterfactual explanations for models of code

J Cito, I Dillig, V Murali, S Chandra - Proceedings of the 44th …, 2022 - dl.acm.org
Machine learning (ML) models play an increasingly prevalent role in many software
engineering tasks. However, because most models are now powered by opaque deep …