Search Results - "2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)"

Refine Results
  1. 1

    LineVD: Statement-level Vulnerability Detection using Graph Neural Networks by Hin, David, Kan, Andrey, Chen, Huaming, Babar, M. Ali

    “…Current machine-learning based software vulnerability detection methods are primarily conducted at the function-level. However, a key limitation of these…”
    Get full text
    Conference Proceeding
  2. 2

    An Empirical Evaluation of GitHub Copilot's Code Suggestions by Nguyen, Nhan, Nadi, Sarah

    “…GitHub and OpenAI recently launched Copilot, an "AI pair programmer" that utilizes the power of Natural Language Processing, Static Analysis, Code Synthesis,…”
    Get full text
    Conference Proceeding
  3. 3

    LineVul: A Transformer-based Line-Level Vulnerability Prediction by Fu, Michael, Tantithamthavorn, Chakkrit

    “…Software vulnerabilities are prevalent in software systems, causing a variety of problems including deadlock, information loss, or system failures. Thus, early…”
    Get full text
    Conference Proceeding
  4. 4

    GraphCode2Vec: Generic Code Embedding via Lexical and Program Dependence Analyses by Ma, Wei, Zhao, Mengjie, Soremekun, Ezekiel, Hu, Qiang, Zhang, Jie M., Papadakis, Mike, Cordy, Maxime, Xie, Xiaofei, Le Traon, Yves

    “…Code embedding is a keystone in the application of machine learning on several Software Engineering (SE) tasks. To effectively support a plethora of SE tasks,…”
    Get full text
    Conference Proceeding
  5. 5

    On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models by Le, Triet Huynh Minh, Babar, M. Ali

    “…Many studies have developed Machine Learning (ML) approaches to detect Software Vulnerabilities (SVs) in functions and fine-grained code statements that cause…”
    Get full text
    Conference Proceeding
  6. 6

    Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques by Bui, Quang-Cuong, Scandariato, Riccardo, Ferreyra, Nicolas E. Diaz

    “…In this work we present Vul4j, a Java vulnerability dataset where each vulnerability is associated to a patch and, most importantly, to a Proof of…”
    Get full text
    Conference Proceeding
  7. 7

    BotHunter: An Approach to Detect Software Bots in GitHub by Abdellatif, Ahmad, Wessel, Mairieli, Steinmacher, Igor, Gerosa, Marco A., Shihab, Emad

    “…Bots have become popular in software projects as they play critical roles, from running tests to fixing bugs/vulnerabilities. However, the large number of…”
    Get full text
    Conference Proceeding
  8. 8

    Smelly Variables in Ansible Infrastructure Code: Detection, Prevalence, and Lifetime by Opdebeeck, Ruben, Zerouali, Ahmed, De Roover, Coen

    “…Infrastructure as Code is the practice of automating the provisioning, configuration, and orchestration of network nodes using code in which variable values…”
    Get full text
    Conference Proceeding
  9. 9

    Message from the MSR 2022 Data and Tool Showcase Track Co-Chairs

    “…On behalf of the entire Program Committee, it is our pleasure to welcome you to the Data and Tool Showcase Track of MSR 2022! The goal of this track is to…”
    Get full text
    Conference Proceeding
  10. 10

    Message from the MSR 2022 Hackathon Track Co-Chairs

    “…Today, software is developed thanks to many supporting systems, which provide help for source code management, code review, issue tracking, synchronous or…”
    Get full text
    Conference Proceeding
  11. 11

    Message from the MSR 2022 General and Program Co-Chairs

    “…Provides a listing of current committee members and society officers…”
    Get full text
    Conference Proceeding
  12. 12

    Message from the MSR 2022 Shadow PC Track Co-Chairs

    “…The Shadow PC track was introduced in MSR 2021. It is a unique opportunity for PhD students and early career researchers to understand the peer review process…”
    Get full text
    Conference Proceeding
  13. 13

    Message from the MSR 2022 Industry Track Co-Chairs

    “…The MSR 2022 Industry Track is the venue to present and learn about the opportunities, challenges, and cutting-edge technology related to using data from…”
    Get full text
    Conference Proceeding
  14. 14

    DISCO: A Dataset of Discord Chat Conversations for Software Engineering Research by Subash, Keerthana Muthu, Kumar, Lakshmi Prasanna, Vadlamani, Sri Lakshmi, Chatterjee, Preetha, Baysal, Olga

    “…Today, software developers work on complex and fast-moving projects that often require instant assistance from other domain and subject matter experts. Chat…”
    Get full text
    Conference Proceeding
  15. 15

    Code Review Practices for Refactoring Changes: An Empirical Study on OpenStack by AlOmar, Eman Abdullah, Chouchen, Moataz, Mkaouer, Mohamed Wiem, Ouni, Ali

    “…Modern code review is a widely used technique employed in both industrial and open-source projects to improve software quality, share knowledge, and ensure…”
    Get full text
    Conference Proceeding
  16. 16

    On the Violation of Honesty in Mobile Apps: Automated Detection and Categories by Obie, Humphrey O., Ilekura, Idowu, Du, Hung, Shahin, Mojtaba, Grundy, John, Li, Li, Whittle, Jon, Turhan, Burak

    “…Human values such as integrity, privacy, curiosity, security, and honesty are guiding principles for what people consider important in life. Such human values…”
    Get full text
    Conference Proceeding
  17. 17

    Microsoft CloudMine: Data Mining for the Executive Order on Improving the Nation's Cybersecurity by Herzig, Kim, Ghostling, Luke, Grothusmann, Maximilian, Just, Sascha, Huang, Nora, Klimowski, Alan, Ramkumar, Yashasvini, McLeroy, Myles, Muslu, Kivanc, Sajnani, Hitesh, Vadaga, Varsha

    “…As any other US software maker, Microsoft is bound by the "Executive Order on Improving the Nation's Cybersecurity" [2] which dictates a clear mandate to…”
    Get full text
    Conference Proceeding
  18. 18

    An Alternative Issue Tracking Dataset of Public Jira Repositories by Montgomery, Lloyd, Luders, Clara, Maalej, Walid

    “…Organisations use issue tracking systems (ITSs) to track and document their projects' work in units called issues. This style of documentation encourages…”
    Get full text
    Conference Proceeding
  19. 19

    Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue by Shu, Rui, Xia, Tianpei, Williams, Laurie, Menzies, Tim

    “…Background: Machine learning techniques have been widely used and demonstrate promising performance in many software security tasks such as software…”
    Get full text
    Conference Proceeding
  20. 20

    How to Improve Deep Learning for Software Analytics (a case study with code smell detection) by Yedida, Rahul, Menzies, Tim

    “…To reduce technical debt and make code more maintainable, it is important to be able to warn programmers about code smells. State-of-the-art code small…”
    Get full text
    Conference Proceeding