Best Paper Awards (FSE)

2002-2018

Posted by pxzhang on January 1, 2019
Year Title Authors
2018 Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks Shengjian (Daniel) Guo, Virginia Tech
Meng Wu, Virginia Tech
Chao Wang, University of Southern California
2018 An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems Yu Gao, Chinese Academy of Sciences
Wensheng Dou, Chinese Academy of Sciences
Feng Qin, Ohio State University
Chushu Gao, Chinese Academy of Sciences
Dong Wang, Chinese Academy of Sciences
Jun Wei, Chinese Academy of Sciences
Ruirui Huang, Alibaba Group
Li Zhou, Alibaba Group
Yongming Wu, Alibaba Group
2018 Data Race Detection on Compressed Traces Dileep Kini, University of Illinois at Urbana-Champaign
Umang Mathur, University of Illinois at Urbana-Champaign
Mahesh Viswanathan, University of Illinois at Urbana-Champaign
2018 Oreo: Detection of Clones in the Twilight Zone Vaibhav Saini, University of California Irvine
Farima Farmahinifarahani, University of California Irvine
Yadong Lu, University of California Irvine
Pierre Baldi, University of California Irvine
Crista Lopes, University of California Irvine
2018 The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the Ecosystem Scale James C. Davis, Virginia Tech
Christy A. Coghlan, Virginia Tech
Francisco Servant, Virginia Tech
Dongyoon Lee, Virginia Tech
2018 Do Android Taint Analysis Tools Keep Their Promises? Felix Pauck, Paderborn University
Eric Bodden, Paderborn University
Heike Wehrheim, Paderborn University
2017 The Power of “Why” and “Why Not”: Enriching Scenario Exploration with Provenance Tim Nelson, Brown University
Natasha Danas, Brown University
Daniel J. Dougherty, Worcester Polytechnic Institute
Shriram Krishnamurthi, Brown University
2017 Cooperative Kernels: GPU Multitasking for Blocking Algorithms Tyler Sorensen, Imperial College London
Hugues Evrard, Imperial College London
Alastair F. Donaldson, Imperial College London
2017 Understanding Misunderstandings in Source Code Dan Gopstein, New York University
Jake Iannacone, New York University
Yu Yan, Pennsylvania State University
Lois DeLong, New York University
Yanyan Zhuang, University of Colorado
Martin K.-C. Yeh, Pennsylvania State University
Justin Cappos, New York University
2017 Trade-Offs in Continuous Integration: Assurance, Security, and Flexibility Michael Hilton, Oregon State University
Nicholas Nelson, Oregon State University
Timothy Tunnell, University of Illinois at Urbana-Champaign
Darko Marinov, University of Illinois at Urbana-Champaign
Danny Dig, Oregon State University
2017 Discovering Relational Specifications Calvin Smith, University of Wisconsin-Madison
Gabriel Ferns, University of Wisconsin-Madison
Aws Albarghouthi, University of Wisconsin-Madison
2017 Automatically Diagnosing and Repairing Error Handling Bugs in C Yuchi Tian & Baishakhi Ray, University of Virginia
2017 Fairness Testing: Testing Software for Discrimination Sainyam Galhotra, University of Massachusetts Amherst
Yuriy Brun, University of Massachusetts Amherst
Alexandra Meliou, University of Massachusetts Amherst
2016 Foraging and Navigations Fundamentally: Developers’ Predictions of Value and Cost David Piorkowski, Oregon State University
Austin Z. Henley, University of Memphis
Tahmid Nabi, Oregon State University
Scott D. Fleming, University of Memphis
Christopher Scaffidi, Oregon State University
Margaret Burnett, Oregon State University
2016 Multi-Representational Security Analysis Eunsuk Kang, University of California Berkeley
Aleksandar Milicevic, Microsoft
Daniel Jackson, Massachusetts Institute of Technology
2016 Factors Influencing Code Review Processes in Industry Tobias Baum, Leibniz Universität Hannover
Olga Liskin, Leibniz Universität Hannover
Kai Niklas, Leibniz Universität Hannover
Kurt Schneider, Leibniz Universität Hannover
2016 API Code Recommendation Using Statistical Learning from Fine-grained Changes Anh Tuan Nguyen, Iowa State University
Michael Hilton, Oregon State University
Mihai Codoban, Microsoft
Hoan Anh Nguyen, Iowa State University
Lily Mast, University of Evansville
Eli Rademacher, Oregon State University
Tien N. Nguyen, Iowa State University
Danny Dig, Oregon State University
2016 Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis Xiaofei Xie, Tianjin University
Bihuan Chen, Nanyang Technological University
Yang Liu, Nanyang Technological University
Wei Le, Iowa State University
Xiaohong Li, Tianjin University
2016 Why We Refactor? Confessions of GitHub Contributors Danilo Silva, Federal University of Minas Gerais
Nikolaos Tsantalis, Concordia University
Marco Tulio Valente, Federal University of Minas Gerais
2016 Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis Jianjun Huang, Purdue University
Xiangyu Zhang, Purdue University
Lin Tan, University of Waterloo
2015 Optimizing energy consumption of GUIs in Android apps: a multi-objective approach Mario Linares-Vásquez, College of William and Mary
Gabriele Bavota, Free University of Bolzano
Carlos Eduardo Bernal Cárdenas, College of William and Mary
Rocco Oliveto, University of Molise
Massimiliano Di Penta, University of Sannio
Denys Poshyvanyk, College of William and Mary
2015 How Practitioners Perceive the Relevance of Software Engineering Research David Lo, Singapore Management University
Nachiappan Nagappan, Microsoft Research
Thomas Zimmermann, Microsoft Research
2015 Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers Reza Matinnejad, University of Luxembourg
Shiva Nejati, University of Luxembourg
Lionel C. Briand, University of Luxembourg
Thomas Bruckmann, Delphi Automotive Systems
2015 Modeling Readability to Improve Unit Tests Ermira Daka, University of Sheffield
José Campos, University of Sheffield
Gordon Fraser, University of Sheffield
Jonathan Dorn, University of Virginia
Westley Weimer, University of Virginia
2015 Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt Neil A. Ernst, Carnegie Mellon University
Stephany Bellomo, Carnegie Mellon University
Ipek Ozkaya, Carnegie Mellon University
Robert L. Nord, Carnegie Mellon University
Ian Gorton, Carnegie Mellon University
2015 A User-Guided Approach to Program Analysis Ravi Mangal, Georgia Institute of Technology
Xin Zhang, Georgia Institute of Technology
Aditya V. Nori, Microsoft Research
Mayur Naik, Georgia Institute of Technology
2015 MultiSE: Multi-path Symbolic Execution using Value Summaries Koushik Sen, University of California Berkeley
George Necula, University of California Berkeley
Liang Gong, University of California Berkeley
Wontae Choi, University of California Berkeley
2015 Users Beware: Preference Inconsistencies Ahead Farnaz Behrang, Georgia Institute of Technology
Myra B. Cohen, University of Nebraska-Lincoln
Alessandro Orso, Georgia Institute of Technology
2014 Selection and Presentation Practices for Code Example Summarization Annie Ying & Martin Robillard, McGill University
2014 Are Mutants a Valid Substitute for Real Faults in Software Testing? René Just, University of Washington
Darioush Jalali, University of Washington
Laura Inozemtseva, University of Waterloo
Michael Ernst, University of Washington
Reid Holmes, University of Waterloo
Gordon Fraser, University of Sheffield
2014 AI: A Lightweight System for Tolerating Concurrency Bugs Mingxing Zhang, Tsinghua University
Yongwei Wu, Tsinghua University
Shan Lu, University of Wisconsin
Shanxiang Qi, University of Illinois at Urbana-Champaign
Jinglei Ren, Tsinghua University
Weimin Zheng, Tsinghua University
2014 Powering the Static Driver Verifier using Corral Akash Lal & Shaz Qadeer, Microsoft Research
2014 Learning Natural Coding Conventions Miltiadis Allamanis, University of Edinburgh
Earl T. Barr, University College London
Christian Bird, Microsoft Research
Charles Sutton, University of Edinburgh
2014 Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study Klaus-Benedikt Schultis, Siemens Corporate Technology
Christoph Elsner, Siemens Corporate Technology
Daniel Lohmann, Friedrich-Alexander University
2012 Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries Bradley Cossette & Robert Walker, University of Calgary
2012 Scalable Test Data Generation from Multidimensional Models Emina Torlak, University of California Berkeley
2012 Assessing the Value of Branches with What-if Analysis Christian Bird & Thomas Zimmermann, Microsoft Research
2011 Proactive Detection of Collaboration Conflicts Yuriy Brun, University of Washington
Reid Holmes, University of Waterloo
Michael D. Ernst, University of Washington
David Notkin, University of Washington
2011 How Do Fixes Become Bugs? Zuoning Yin, University of Illinois at Urbana-Champaign
Ding Yuan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of California San Diego
Shankar Pasupathy, NetApp
Lakshmi Bairavasundaram, NetApp
2011 Proving programs robust Swarat Chaudhuri, Rice University
Sumit Gulwani, Microsoft Research
Roberto Lublinerman, Pennsylvania State University
Sara Navidpour, Pennsylvania State University
2010 Creating and evolving developer documentation: understanding the decisions of open source contributors Barthélémy Dagenais & Martin P. Robillard, McGill University
2010 Developer Fluency: Achieving True Mastery in Software Projects Minghui Zhou, Peking University
Audris Mockus, Avaya Labs
2010 Staged Concurrent Program Analysis Nishant Sinha & Chao Wang, NEC Labs America
2009 Asserting and checking determinism for multithreaded programs Jacob Burnim & Koushik Sen, University of California Berkeley
2009 Darwin: an approach for debugging evolving programs Dawei Qi, National University of Singapore
Abhik Roychoudhury, National University of Singapore
Zhenkai Liang, National University of Singapore
Kapil Vaswani, Microsoft Research
2009 Graph-based Mining of Multiple Object Usage Patterns Tung Thanh Nguyen, Iowa State University
Hoan Anh Nguyen, Iowa State University
Nam H. Pham, Iowa State University
Jafar M. Al-Kofahi, Iowa State University
Tien N. Nguyen, Iowa State University
2008 What makes a good bug report? Nicolas Bettenburg, Saarland University
Sascha Just, Saarland University
Adrian Schröter, University of Victoria
Cathrin Weiss, University of Zurich
Rahul Premraj, Saarland University
Thomas Zimmermann, University of Calgary
2008 Efficient online monitoring of web-service SLAs Franco Raimondi, University College London
James Skene, University College London
Wolfgang Emmerich, University College London
2007 Automatic consistency assessment for query results in dynamic environments Jamie Payton, University of North Carolina at Charlotte
Christine Julien, University of Texas at Austin
Gruia-Catalin Roman, Washington University in St. Louis
2007 Globally distributed software development project performance: an empirical analysis Narayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University
2007 Mining specifications of malicious behavior Mihai Christodorescu, University of Wisconsin
Somesh Jha, University of Wisconsin
Christopher Kruegel, Vienna University of Technology
2007 Object and reference immutability using Java generics Yoav Zibin, Massachusetts Institute of Technology
Alex Potanin, Victoria University of Wellington
Mahmood Ali, Massachusetts Institute of Technology
Shay Artzi, Massachusetts Institute of Technology
Adam Kieżun, Massachusetts Institute of Technology
Michael D. Ernst, Massachusetts Institute of Technology
2006 Controlling factors in evaluating path-sensitive error detection techniques Matthew B. Dwyer, University of Nebraska-Lincoln
Suzette Person, University of Nebraska-Lincoln
Sebastian Elbaum, University of Nebraska-Lincoln
2006 SYNERGY: a new algorithm for property checking Bhargav S. Gulavani, Indian Institute of Technology
Thomas A. Henzinger, École Polytechnique Fédérale de Lausanne
Yamini Kannan, Microsoft Research
Aditya V. Nori, Microsoft Research
Sriram K. Rajamani, Microsoft Research
2005 Automatic Generation of Suggestions for Program Investigation Martin P. Robillard, McGill University
2005 CUTE: a concolic unit testing engine for C Koushik Sen, University of Illinois at Urbana-Champaign
Darko Marinov, University of Illinois at Urbana-Champaign
Gul Agha, University of Illinois at Urbana-Champaign
2005 Context- and path-sensitive memory leak detection Yichen Xie & Alex Aiken, Stanford University
2004 Reasoning about partial goal satisfaction for requirements and design engineering Emmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain
2004 A classification system and analysis for aspect-oriented programs Martin Rinard, Massachusetts Institute of Technology
Alexandru Salcianu, Massachusetts Institute of Technology
Suhabe Bugrara, Massachusetts Institute of Technology
2003 Eliminating redundancies with a “composition with adaptation” meta-programming technique Stan Jarzabek, National University of Singapore
Li Shubiao, Xi’an Jiaotong University
2003 A Family of Test Adequacy Criteria for Database-Driven Applications Gregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh
2003 Predicting problems caused by component upgrades Stephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology
2002 Isolating Cause-Effect Chains from Computer Programs Andreas Zeller, Saarland University