MSR 2025
Mon 28 - Tue 29 April 2025 Ottawa, Ontario, Canada
co-located with ICSE 2025
Dates
Tracks

This program is tentative and subject to change.

You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 28 Apr

Displayed time zone: Eastern Time (US & Canada) change

09:00 - 10:30
Plenary: Opening + Joint MSR + ICPC KeynoteProgram / Keynotes at 214
09:00
30m
Day opening
Opening + Award Announcement
Program

09:30
60m
Talk
Mining BOMs for Improving Supply Chain Efficiency & Resilience
Keynotes
Kate Stewart Linux Foundation
11:00 - 12:30
Defects, bugs, and issuesData and Tool Showcase Track / Technical Papers at 214
11:00
10m
Talk
Learning from Mistakes: Understanding Ad-hoc Logs through Analyzing Accidental Commits
Technical Papers
Yi-Hung Chou University of California, Irvine, Yiyang Min Amazon, April Wang ETH Zürich, James Jones University of California at Irvine
Pre-print
11:10
10m
Talk
On the calibration of Just-in-time Defect Prediction
Technical Papers
Xhulja Shahini paluno - University of Duisburg-Essen, Jone Bartel University of Duisburg-Essen, paluno, Klaus Pohl University of Duisburg-Essen, paluno
11:20
10m
Talk
An Empirical Study on Leveraging Images in Automated Bug Report Reproduction
Technical Papers
Dingbang Wang University of Connecticut, Zhaoxu Zhang University of Southern California, Sidong Feng Monash University, William G.J. Halfond University of Southern California, Tingting Yu University of Connecticut
11:30
10m
Talk
It’s About Time: An Empirical Study of Date and Time Bugs in Open-Source Python Software
Technical Papers
Shrey Tiwari Carnegie Mellon University, Serena Chen University of California, San Diego, Alexander Joukov Stony Brook University, Peter Vandervelde University of California, Santa Barbara, Ao Li Carnegie Mellon University, Rohan Padhye Carnegie Mellon University
11:40
10m
Talk
Enhancing Just-In-Time Defect Prediction Models with Developer-Centric Features
Technical Papers
Emanuela Guglielmi University of Molise, Andrea D'Aguanno University of Molise, Rocco Oliveto University of Molise, Simone Scalabrino University of Molise
11:50
10m
Talk
Revisiting Defects4J for Fault Localization in Diverse Development Scenarios
Technical Papers
Md Nakhla Rafi Concordia University, An Ran Chen University of Alberta, Tse-Hsun (Peter) Chen Concordia University, Shaohua Wang Central University of Finance and Economics
12:00
5m
Talk
Mining Bug Repositories for Multi-Fault Programs
Data and Tool Showcase Track
Dylan Callaghan Stellenbosch University, Bernd Fischer Stellenbosch University
12:05
5m
Talk
HaPy-Bug - Human Annotated Python Bug Resolution Dataset
Data and Tool Showcase Track
Piotr Przymus Nicolaus Copernicus University in Toruń, Poland, Mikołaj Fejzer Nicolaus Copernicus University in Toruń, Jakub Narębski Nicolaus Copernicus University in Toruń, Radosław Woźniak Nicolaus Copernicus University in Toruń, Łukasz Halada University of Wrocław, Poland, Aleksander Kazecki Nicolaus Copernicus University in Toruń, Mykhailo Molchanov Igor Sikorsky Kyiv Polytechnic Institute, Ukraine, Krzysztof Stencel University of Warsaw
12:10
5m
Talk
SPRINT: An Assistant for Issue Report Management
Data and Tool Showcase Track
Ahmed Adnan , Antu Saha William & Mary, Oscar Chaparro William & Mary
Pre-print
11:00 - 12:30
11:00
10m
Talk
Wolves in the Repository: A Software Engineering Analysis of the XZ Utils Supply Chain Attack
Technical Papers
Piotr Przymus Nicolaus Copernicus University in Toruń, Poland, Thomas Durieux TU Delft
11:10
10m
Talk
Software Composition Analysis and Supply Chain Security in Apache Projects: an Empirical Study
Technical Papers
Sabato Nocera University of Salerno, Sira Vegas Universidad Politecnica de Madrid, Giuseppe Scanniello University of Salerno, Natalia Juristo Universidad Politecnica de Madrid
Pre-print
11:20
10m
Talk
Good practice versus reality: a landscape analysis of Research Software metadata adoption in European Open Science Clusters
Technical Papers
Anas El Hounsri Universidad Politécnica de Madrid, Daniel Garijo Universidad Politécnica de Madrid
11:30
10m
Talk
Towards Security Commit Message Standardization
Technical Papers
Sofia Reis Instituto Superior Técnico, U. Lisboa & INESC-ID, Rui Abreu INESC-ID; University of Porto, Corina Pasareanu CMU, NASA, KBR
11:40
10m
Talk
From Industrial Practices to Academia: Uncovering the Gap in Vulnerability Research and Practice
Technical Papers
Zhuang Liu , Xing Hu Zhejiang University, Jiayuan Zhou Queen's University, Xin Xia Huawei
11:50
5m
Talk
Patch Me If You Can—Securing the Linux Kernel
Industry Track
Gunnar Kudrjavets Amazon Web Services, USA
Pre-print
11:55
5m
Talk
OSS License Identification at Scale: A Comprehensive Dataset Using World of Code
Data and Tool Showcase Track
Mahmoud Jahanshahi Research Assistant, University of Tennessee Knoxville, David Reid University of Tennessee, Adam McDaniel University of Tennessee Knoxville, Audris Mockus The University of Tennessee
12:00
5m
Talk
SCRUBD: Smart Contracts Reentrancy and Unhandled Exceptions Vulnerability Dataset
Data and Tool Showcase Track
Chavhan Sujeet Yashavant Indian Institute of Technology, Kanpur, Mitrajsinh Chavda Indian Institute of Technology Kanpur, India, Saurabh Kumar Indian Institute of Technology Hyderabad, India, Amey Karkare IIT Kanpur, Angshuman Karmakar Indian Institute of Technology Kanpur, India
Pre-print
12:05
5m
Talk
ICVul: A Well-labeled C/C++ Vulnerability Dataset with Comprehensive Metadata and VCCs
Data and Tool Showcase Track
Chaomeng Lu DistriNet Group-T, KU Leuven, Tianyu Li DistriNet Group-T, KU Leuven, Toon Dehaene KU Leuven, Bert Lagaisse DistriNet Group-T, KU Leuven
12:10
5m
Talk
A Dataset of Software Bill of Materials for Evaluating SBOM Consumption Tools
Data and Tool Showcase Track
Rio Kishimoto Osaka University, Tetsuya Kanda Notre Dame Seishin University, Yuki Manabe The University of Fukuchiyama, Katsuro Inoue Nanzan University, Shi Qiu Toshiba, Yoshiki Higo Osaka University
12:15
5m
Talk
Wild SBOMs: a Large-scale Dataset of Software Bills of Materials from Public Code
Data and Tool Showcase Track
Luis Soeiro LTCI, Télécom Paris, Institut Polytechnique de Paris, Thomas Robert LTCI, Télécom Paris, Institut Polytechnique de Paris, Stefano Zacchiroli Télécom Paris, Polytechnic Institute of Paris
Pre-print
12:20
5m
Talk
MaLAware: Automating the Comprehension of Malicious Software Behaviours using Large Language Models (LLMs)
Data and Tool Showcase Track
BIKASH SAHA Indian Institute of Technology Kanpur, Nanda Rani Indian Institute of Technology Kanpur, Sandeep K. Shukla Indian Institute of Technology Kanpur
13:00 - 13:30
14:00 - 15:30
14:00
10m
Talk
Combining Large Language Models with Static Analyzers for Code Review Generation
Technical Papers
Imen Jaoua DIRO, Université de Montréal, Oussama Ben Sghaier DIRO, Université de Montréal, Houari Sahraoui DIRO, Université de Montréal
Pre-print
14:10
10m
Talk
Harnessing Large Language Models for Curated Code Reviews
Technical Papers
Oussama Ben Sghaier DIRO, Université de Montréal, Martin Weyssow Singapore Management University, Houari Sahraoui DIRO, Université de Montréal
Pre-print
14:20
10m
Talk
SMATCH-M-LLM: Semantic Similarity in Metamodel Matching With Large Language Models
Technical Papers
Nafisa Ahmed Polytechnique Montreal, Hin Chi Kwok Hong Kong Polytechnic University, Mohammad Hamdaqa Polytechnique Montréal, Wesley Assunção North Carolina State University
14:30
10m
Talk
How Effective are LLMs for Data Science Coding? A Controlled Experiment
Technical Papers
Nathalia Nascimento Pennsylvania State University, Everton Guimaraes Pennsylvania State University, USA, Sai Sanjna Chintakunta Pennsylvania State University, Santhosh AB Pennsylvania State University
Pre-print
14:40
10m
Talk
Do LLMs Provide Links to Code Similar to what they Generate? A Study with Gemini and Bing CoPilot
Technical Papers
Daniele Bifolco University of Sannio, Pietro Cassieri University of Salerno, Giuseppe Scanniello University of Salerno, Massimiliano Di Penta University of Sannio, Italy, Fiorella Zampetti University of Sannio, Italy
Pre-print
14:50
10m
Talk
Too Noisy To Learn: Enhancing Data Quality for Code Review Comment Generation
Technical Papers
Chunhua Liu The University of Melbourne, Hong Yi Lin The University of Melbourne, Patanamon Thongtanunam University of Melbourne
15:00
5m
Talk
Should Code Models Learn Pedagogically? A Preliminary Evaluation of Curriculum Learning for Real-World Software Engineering Tasks
Technical Papers
Skylar Kyi Shin Khant The University of Melbourne, Hong Yi Lin The University of Melbourne, Patanamon Thongtanunam University of Melbourne
15:05
5m
Talk
RepoChat: An LLM-Powered Chatbot for GitHub Repository Question-Answering
Data and Tool Showcase Track
Samuel Abedu Concordia University, Laurine Menneron CESI Graduate School of Engineering, SayedHassan Khatoonabadi Concordia University, Emad Shihab Concordia University
14:00 - 15:30
MSR 2025 Mining ChallengeMining Challenge at 215
Chair(s): Joyce El Haddad Université Paris Dauphine - PSL , Damien Jaime Université Paris Nanterre & LIP6, Pascal Poizat Université Paris Nanterre & LIP6
14:00
4m
Talk
Analyzing Dependency Clusters and Security Risks in the Maven Central Repository
Mining Challenge
George Lake Idaho State University, Minhaz F. Zibran Idaho State University
14:04
4m
Talk
Chasing the Clock: How Fast Are Vulnerabilities Fixed in the Maven Ecosystem?
Mining Challenge
Md Fazle Rabbi Idaho State University, Arifa Islam Champa Idaho State University, Rajshakhar Paul Wayne State University, Minhaz F. Zibran Idaho State University
14:08
4m
Talk
Decoding Dependency Risks: A Quantitative Study of Vulnerabilities in the Maven Ecosystem
Mining Challenge
Costain Nachuma Idaho State University, Md Mosharaf Hossan Idaho State University, Asif Kamal Turzo Wayne State University, Minhaz F. Zibran Idaho State University
14:12
4m
Talk
Faster Releases, Fewer Risks: A Study on Maven Artifact Vulnerabilities and Lifecycle Management
Mining Challenge
Md Shafiullah Shafin Rajshahi University of Engineering & Technology (RUET), Md Fazle Rabbi Idaho State University, S. M. Mahedy Hasan Rajshahi University of Engineering & Technology, Minhaz F. Zibran Idaho State University
14:16
4m
Talk
Insights into Dependency Maintenance Trends in the Maven Ecosystem
Mining Challenge
Barisha Chowdhury Rajshahi University of Engineering & Technology, Md Fazle Rabbi Idaho State University, S. M. Mahedy Hasan Rajshahi University of Engineering & Technology, Minhaz F. Zibran Idaho State University
14:20
4m
Talk
Insights into Vulnerability Trends in Maven Artifacts: Recurrence, Popularity, and User Behavior
Mining Challenge
Courtney Bodily Idaho State University, Eric Hill Idaho State University, Andreas Kramer Idaho State University, Leslie Kerby Idaho State University, Minhaz F. Zibran Idaho State University
14:24
4m
Talk
Understanding Software Vulnerabilities in the Maven Ecosystem: Patterns, Timelines, and Risks
Mining Challenge
Md Fazle Rabbi Idaho State University, Rajshakhar Paul Wayne State University, Arifa Islam Champa Idaho State University, Minhaz F. Zibran Idaho State University
14:28
4m
Talk
Dependency Update Adoption Patterns in the Maven Software Ecosystem
Mining Challenge
Baltasar Berretta College of Wooster, Augustus Thomas College of Wooster, Heather Guarnera The College of Wooster
14:32
4m
Talk
Analyzing Vulnerability Overestimation in Software Projects
Mining Challenge
Taha Draoui University of Michigan-Flint, Faten Jebari University of Michigan-Flint, Chawki Ben Slimen University of Michigan-Flint, Munjaap Uppal University of Michigan-Flint, Mohamed Wiem Mkaouer University of Michigan - Flint
14:36
4m
Talk
Dependency Dilemmas: A Comparative Study of Independent and Dependent Artifacts in Maven Ecosystem
Mining Challenge
Mehedi Hasan Shanto Khulna University, Muhammad Asaduzzman University of Windsor, Manishankar Mondal Khulna University, Shaiful Chowdhury University of Manitoba
14:40
4m
Talk
Cascading Effects: Analyzing Project Failure Impact in the Maven Central Ecosystem
Mining Challenge
Mina Shehata Belmont University, Saidmakhmud Makhkamjonoov Belmont University, Mahad Syed Belmont University, Esteban Parra Belmont University
14:45
4m
Talk
Do Developers Depend on Deprecated Library Versions? A Mining Study of Log4j
Mining Challenge
Haruhiko Yoshioka Nara Institute of Science and Technology, Sila Lertbanjongngam Nara Institute of Science and Technology, Masayuki Inaba Nara Institute of Science and Technology, Youmei Fan Nara Institute of Science and Technology, Takashi Nakano Nara Institute of Science and Technology, Kazumasa Shimari Nara Institute of Science and Technology, Raula Gaikovina Kula Osaka University, Kenichi Matsumoto Nara Institute of Science and Technology
14:49
4m
Talk
Mining for Lags in Updating Critical Security Threats: A Case Study of Log4j Library
Mining Challenge
Hidetake Tanaka Nara Institute of Science and Technology, Kazuma Yamasaki Nara Institute of Science and Technology, Momoka Hirose Nara Institute of Science and Technology, Takashi Nakano Nara Institute of Science and Technology, Youmei Fan Nara Institute of Science and Technology, Kazumasa Shimari Nara Institute of Science and Technology, Raula Gaikovina Kula Osaka University, Kenichi Matsumoto Nara Institute of Science and Technology
14:53
4m
Talk
On the Evolution of Unused Dependencies in Java Project Releases: An Empirical Study
Mining Challenge
Nabhan Suwanachote Nara Institute of Science and Technology, Yagut Shakizada Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Bin Lin Hangzhou Dianzi University, Hajimu Iida Nara Institute of Science and Technology
14:57
4m
Talk
Out of Sight, Still at Risk: The Lifecycle of Transitive Vulnerabilities in Maven
Mining Challenge
Piotr Przymus Nicolaus Copernicus University in Toruń, Poland, Mikołaj Fejzer Nicolaus Copernicus University in Toruń, Jakub Narębski Nicolaus Copernicus University in Toruń, Krzysztof Rykaczewski Nicolaus Copernicus University in Toruń, Poland, Krzysztof Stencel University of Warsaw
15:01
4m
Talk
Popularity and Innovation in Maven Central
Mining Challenge
Nkiru Ede Victoria University of Wellington, Jens Dietrich Victoria University of Wellington, Ulrich Zülicke Victoria University of Wellington
15:05
4m
Talk
Software Bills of Materials in Maven Central
Mining Challenge
Yogya Gamage Universtité de Montréal, Nadia Gonzalez Fernandez Université de Montréal, Martin Monperrus KTH Royal Institute of Technology, Benoit Baudry
15:09
4m
Talk
The Ripple Effect of Vulnerabilities in Maven Central: Prevalence, Propagation, and Mitigation Challenges
Mining Challenge
Ehtisham Ul Haq York University, Song Wang York University, Robert S Allison York University
15:13
4m
Talk
Tracing Vulnerabilities in Maven: A Study of CVE lifecycles and Dependency Networks
Mining Challenge
Corey Yang-Smith University of Calgary, Ahmad Abdellatif University of Calgary
Pre-print
15:17
4m
Talk
Understanding Abandonment and Slowdown Dynamics in the Maven Ecosystem
Mining Challenge
Kazi Amit Hasan Queen's University, Canada, Jerin Yasmin Queen's University, Canada, Huizi Hao Queen's University, Canada, Yuan Tian Queen's University, Kingston, Ontario, Safwat Hassan University of Toronto, Steven Ding
Pre-print
15:21
4m
Talk
Characterizing Packages for Vulnerability Prediction
Mining Challenge
Saviour Owolabi University of Calgary, Francesco Rosati University of Calgary, Ahmad Abdellatif University of Calgary, Lorenzo De Carli University of Calgary, Canada
15:25
4m
Talk
Understanding the Popularity of Packages in Maven Ecosystem
Mining Challenge
Sadman Jashim Sakib University of Windsor, Muhammad Asaduzzaman University of Windsor, Curtis Bright University of Windsor, Cole Morgan University of Windsor
16:00 - 17:30
Software evolution and analysisData and Tool Showcase Track / Technical Papers / Industry Track at 214
16:00
10m
Talk
50 Years of Programming Language Evolution through the Software Heritage looking glass
Technical Papers
Adèle Desmazières Sorbonne Unversité, Roberto Di Cosmo Inria, France / University of Paris Diderot, France, Valentin Lorentz Inria Foundation
16:10
10m
Talk
It Works (only) on My Machine: A Study on Reproducibility Smells in Ansible Scripts
Technical Papers
Ghazal Sobhani Dalhousie University, Israat Haque Dalhousie University, Tushar Sharma Dalhousie University
Pre-print
16:20
10m
Talk
Are the Majority of Public Computational Notebooks Pathologically Non-Executable?
Technical Papers
Waris Gill Virginia Tech, Muhammad Ali Gulzar Virginia Tech, Tien Nguyen Virginia Tech
Pre-print
16:30
10m
Talk
Understanding Test Deletion in Java Applications
Technical Papers
Suraj Bhatta North Dakota State University, Frank Kendemah North Dakota State University, Ajay Jha North Dakota State University
Pre-print
16:40
10m
Talk
A Public Benchmark of REST APIs
Technical Papers
Alix Decrop University of Namur, Sara Eraso University of Valle, Xavier Devroey University of Namur, Gilles Perrouin Fonds de la Recherche Scientifique - FNRS & University of Namur
Pre-print
16:50
5m
Talk
What Do Contribution Guidelines Say About Software Testing?
Technical Papers
Pre-print
16:55
5m
Talk
Measuring InnerSource Value
Industry Track
17:00
5m
Talk
CoUpJava: A Dataset of Code Upgrade Histories in Open-Source Java Repositories
Data and Tool Showcase Track
Kaihang Jiang University of Waterloo, Bihui Jin University of Waterloo, Pengyu Nie University of Waterloo
17:05
5m
Talk
EvoChain: A Framework for Tracking and Visualizing Smart Contract Evolution
Data and Tool Showcase Track
Ilham Qasse Reykjavik University, Mohammad Hamdaqa Polytechnique Montréal, Björn Þór Jónsson Reykjavik University
17:10
5m
Talk
CoDocBench: A Dataset for Code-Documentation Alignment in Software Maintenance
Data and Tool Showcase Track
Kunal Suresh Pai UC Davis, Prem Devanbu University of California at Davis, Toufique Ahmed IBM Research
17:15
5m
Talk
RefExpo: Unveiling Software Project Structures through Advanced Dependency Graph Extraction
Data and Tool Showcase Track
Vahid Haratian Bilkent Univeristy, Pouria Derakhshanfar JetBrains Research, Vladimir Kovalenko JetBrains Research, Eray Tüzün Bilkent University
17:20
5m
Talk
HyperAST: Incrementally Mining Large Source Code Repositories
Data and Tool Showcase Track
Quentin Le Dilavrec TU Delft, Netherlands, Andy Zaidman Delft University of Technology
Pre-print
16:00 - 17:30
16:00
10m
Talk
How Much Do Code Language Models Remember? An Investigation on Data Extraction Attacks before and after Fine-tuning
Technical Papers
Fabio Salerno Delft University of Technology, Ali Al-Kaswan Delft University of Technology, Netherlands, Maliheh Izadi Delft University of Technology
16:10
10m
Talk
Can LLMs Generate Higher Quality Code Than Humans? An Empirical Study
Technical Papers
Mohammad Talal Jamil Lahore University of Management Sciences, Shamsa Abid National University of Computer and Emerging Sciences, Shafay Shamail LUMS, DHA, Lahore
Pre-print
16:20
10m
Talk
Prompt Engineering or Fine-Tuning: An Empirical Assessment of LLMs for Code
Technical Papers
Jiho Shin York University, Clark Tang , Tahmineh Mohati University of Calgary, Maleknaz Nayebi York University, Song Wang York University, Hadi Hemmati York University
16:30
5m
Talk
Drawing Pandas: A Benchmark for LLMs in Generating Plotting Code
Data and Tool Showcase Track
Timur Galimzyanov JetBrains Research, Sergey Titov JetBrains Research, Yaroslav Golubev JetBrains Research, Egor Bogomolov JetBrains Research
Pre-print
16:35
5m
Talk
SnipGen: A Mining Repository Framework for Evaluating LLMs for Code
Data and Tool Showcase Track
16:50
40m
Talk
Harmonized Coding with AI: LLMs for Qualitative Analysis in Software Engineering Research
Tutorials
Christoph Treude Singapore Management University, Youmei Fan Nara Institute of Science and Technology, Tao Xiao Kyushu University, Hideaki Hata Shinshu University
17:30 - 22:00
18:00
4h
Dinner
Dinner
Catering

Tue 29 Apr

Displayed time zone: Eastern Time (US & Canada) change

09:00 - 10:30
Plenary: MIP + FCAMIP Award / FCA Award / Vision and Reflection at 214
09:00
30m
Awards
MSR 2025 Most Influential Paper Award
MIP Award

09:30
30m
Awards
MSR 2025 Foundational Contribution Award
FCA Award

10:00
30m
Talk
The Standard of Rigor for MSR Research: A 20-Year Evolution
Vision and Reflection
Bogdan Vasilescu Associate Professor of Software and Societal Systems, Carnegie Mellon University, USA, Raj Reddy Associate Professor of Software and Societal Systems, Carnegie Mellon University, USA
11:00 - 12:30
Software ecosystems and humansData and Tool Showcase Track / Technical Papers at 214
Chair(s): Ahmad Abdellatif University of Calgary, Mohammad Hamdaqa Polytechnique Montréal
11:00
10m
Talk
The Ecosystem of Open-Source Music Production Software – A Mining Study on the Development Practices of VST Plugins on GitHub
Technical Papers
Andrei Bogdan University of Amsterdam, Mauricio Verano Merino Vrije Universiteit Amsterdam, Ivano Malavolta Vrije Universiteit Amsterdam
Pre-print
11:10
10m
Talk
Can LLMs Replace Manual Annotation of Software Engineering Artifacts?
Technical Papers
Toufique Ahmed IBM Research, Prem Devanbu University of California at Davis, Christoph Treude Singapore Management University, Michael Pradel University of Stuttgart
Pre-print
11:20
10m
Talk
Investigating the Understandability of Review Comments on Code Change Requests
Technical Papers
Md Shamimur Rahman University of Saskatchewan, Canada, Zadia Codabux University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Canada
11:30
10m
Talk
Mining a Decade of Contributor Dynamics in Ethereum: A Longitudinal Study
Technical Papers
Matteo Vaccargiu University of Cagliari, Sabrina Aufiero University College London (UCL), Cheick Ba Queen Mary University of London, Silvia Bartolucci University College London, Richard Clegg Queen Mary University London, Daniel Graziotin University of Hohenheim, Rumyana Neykova Brunel University London, Roberto Tonelli University of Cagliari, Giuseppe Destefanis Brunel University London
Pre-print
11:40
10m
Talk
Is it Really Fun? Detecting Low Engagement Events in Video Games
Technical Papers
Emanuela Guglielmi University of Molise, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Nicole Novielli University of Bari, Rocco Oliveto University of Molise, Simone Scalabrino University of Molise
11:50
5m
Talk
A Dataset of Contributor Activities in the NumFocus Open-Source Community
Data and Tool Showcase Track
Youness Hourri University of Mons, Alexandre Decan University of Mons; F.R.S.-FNRS, Tom Mens University of Mons
Pre-print
11:55
5m
Talk
Jupyter Notebook Activity Dataset
Data and Tool Showcase Track
Tomoki Nakamaru The University of Tokyo, Tomomasa Matsunaga The University of Tokyo, Tetsuro Yamazaki University of Tokyo
12:00
5m
Talk
CoPhi - Mining C/C++ Packages for Conan Ecosystem Analysis
Data and Tool Showcase Track
Vivek Sarkar University of Washington, Anemone Kampkötter TU Dortmund, Ben Hermann TU Dortmund
Pre-print
12:05
5m
Talk
MARIN: A Research-Centric Interface for Querying Software Artifacts on Maven Repositories
Data and Tool Showcase Track
Johannes Düsing TU Dortmund, Jared Chiaramonte Arizona State University, Ben Hermann TU Dortmund
Pre-print
12:10
5m
Talk
GitProjectHealth: an Extensible Framework for Git Social Platform Mining
Data and Tool Showcase Track
Nicolas Hlad Berger-Levrault, Benoit Verhaeghe Berger-Levrault, Kilian Bauvent Berger-levrault
12:15
5m
Talk
Myriad People. Open Source Software for New Media Arts
Data and Tool Showcase Track
Benoit Baudry , Erik Natanael Gustafsson Independent artist, Roni Kaufman Independent artist, Maria Kling Independent artist
Pre-print
12:20
5m
Talk
OpenMent: A Dataset of Mentor-Mentee Interactions in Google Summer of Code
Data and Tool Showcase Track
Erfan Raoofian University of British Columbia, Fatemeh Hendijani Fard University of British Columbia, Ifeoma Adaji University of British Columbia, Gema Rodríguez-Pérez University of British Columbia (UBC)
12:25
5m
Talk
Under the Blueprints: Parsing Unreal Engine’s Visual Scripting at Scale
Data and Tool Showcase Track
Kalvin Eng University of Alberta, Abram Hindle University of Alberta
11:00 - 12:30
Build systems and DevOpsData and Tool Showcase Track / Technical Papers / Tutorials at 215
Chair(s): Sarah Nadi New York University Abu Dhabi
11:00
7m
Talk
Build Scripts Need Maintenance Too: A Study on Refactoring and Technical Debt in Build Systems
Technical Papers
Anwar Ghammam Oakland University, Dhia Elhaq Rzig University of Michigan - Dearborn, Mohamed Almukhtar Oakland University, Rania Khalsi University of Michigan - Flint, Foyzul Hassan University of Michigan at Dearborn, Marouane Kessentini Grand Valley State University
11:07
7m
Talk
LLMSecConfig: An LLM-Based Approach for Fixing Software Container Misconfigurations
Technical Papers
Ziyang Ye The University of Adelaide, Triet Le The University of Adelaide, Muhammad Ali Babar School of Computer Science, The University of Adelaide
Pre-print
11:14
7m
Talk
How Do Infrastructure-as-Code Practitioners Update Their Dependencies? An Empirical Study on Terraform Module Updates
Technical Papers
Mahi Begoug , Ali Ouni ETS Montreal, University of Quebec, Moataz Chouchen Department of Electrical and Computer Engineering, Concordia University, Montreal, Canada
11:21
7m
Talk
TerraDS: A Dataset for Terraform HCL Programs
Data and Tool Showcase Track
Christoph Buehler University of St. Gallen, David Spielmann University of St. Gallen, Roland Meier armasuisse, Guido Salvaneschi University of St. Gallen
Pre-print
11:28
7m
Talk
OSPtrack: A Labeled Dataset Targeting Simulated Execution of Open-Source Software
Data and Tool Showcase Track
Zhuoran Tan University of Glasgow, Christos Anagnostopoulos University of Glasgow, Jeremy Singer University of Glasgow
11:35
7m
Talk
CARDS: A collection of package, revision, and miscelleneous dependency graphs
Data and Tool Showcase Track
Euxane TRAN-GIRARD LIGM, CNRS, Université Gustave Eiffel, Laurent BULTEAU LIGM, CNRS, Université Gustave Eiffel, Pierre-Yves DAVID Octobus S.c.o.p.
Pre-print
11:42
7m
Talk
GHALogs: Large-scale dataset of GitHub Actions runs
Data and Tool Showcase Track
Florent Moriconi EURECOM, AMADEUS, Thomas Durieux TU Delft, Jean-Rémy Falleri Bordeaux INP, Raphaël Troncy EURECOM, Aurélien Francillon EURECOM
11:50
40m
Talk
Agents for Software Development
Tutorials
Graham Neubig Carnegie Mellon University
14:00 - 15:30
AI for SE (2)Technical Papers / Industry Track / Data and Tool Showcase Track at 214
Chair(s): Giuseppe Destefanis Brunel University London, Mohammad Hamdaqa Polytechnique Montréal
14:00
10m
Talk
Automatic High-Level Test Case Generation using Large Language Models
Technical Papers
Navid Bin Hasan Bangladesh University of Engineering and Technology, Md. Ashraful Islam Bangladesh University of Engineering and Technology, Junaed Younus Khan Bangladesh University of Engineering and Technology, Sanjida Senjik Bangladesh University of Engineering and Technology, Anindya Iqbal Bangladesh University of Engineering and Technology Dhaka, Bangladesh
14:10
10m
Talk
Prompting in the Wild: An Empirical Study of Prompt Evolution in Software Repositories
Technical Papers
Mahan Tafreshipour University of California at Irvine, Aaron Imani University of California, Irvine, Eric Huang University of California, Irvine, Eduardo Santana de Almeida Federal University of Bahia, Thomas Zimmermann University of California, Irvine, Iftekhar Ahmed University of California at Irvine
Pre-print
14:20
10m
Talk
Towards Detecting Prompt Knowledge Gaps for Improved LLM-guided Issue Resolution
Technical Papers
Ramtin Ehsani Drexel University, Sakshi Pathak Drexel University, Preetha Chatterjee Drexel University, USA
Pre-print
14:30
10m
Talk
Intelligent Semantic Matching (ISM) for Video Tutorial Search using Transformer Models
Technical Papers
Ahmad Tayeb , Sonia Haiduc Florida State University
14:40
10m
Talk
Language Models in Software Development Tasks: An Experimental Analysis of Energy and Accuracy
Technical Papers
Negar Alizadeh Universiteit Utrecht, Boris Belchev University of Twente, Nishant Saurabh Utrecht University, Patricia Kelbert Fraunhofer IESE, Fernando Castor University of Twente
14:50
10m
Talk
TriGraph: A Probabilistic Subgraph-Based Model for Visual Code Completion in Pure Data
Technical Papers
Anisha Islam Department of Computing Science, University of Alberta, Abram Hindle University of Alberta
15:00
5m
Talk
Inferring Questions from Programming Screenshots
Technical Papers
Faiz Ahmed York University, Xuchen Tan York University, Folajinmi Adewole York University, Suprakash Datta York University, Maleknaz Nayebi York University
15:05
5m
Talk
Human-In-The-Loop Software Development Agents: Challenges and Future Directions
Industry Track
Jirat Pasuksmit Atlassian, Wannita Takerngsaksiri Monash University, Patanamon Thongtanunam University of Melbourne, Kla Tantithamthavorn Monash University, Ruixiong Zhang Atlassian, Shiyan Wang Atlassian, Fan Jiang Atlassian, Jing Li Atlassian, Evan Cook Atlassian, Kun Chen Atlassian, Ming Wu Atlassian
15:10
5m
Talk
FormalSpecCpp: A Dataset of C++ Formal Specifications Created Using LLMs
Data and Tool Showcase Track
Madhurima Chakraborty University of California, Riverside, Peter Pirkelbauer Lawrence Livermore National Laboratory, Qing Yi Lawrence Livermore National Laboratory
14:00 - 15:30
Software qualityTechnical Papers / Data and Tool Showcase Track at 215
Chair(s): Mohammad Hamdaqa Polytechnique Montréal, Ying Zou Queen's University, Kingston, Ontario
14:00
10m
Talk
PyExamine: A Comprehensive, Un-Opinionated Smell Detection Tool for Python
Technical Papers
Karthik Shivashankar University of Oslo, Antonio Martini University of Oslo, Norway
14:10
10m
Talk
Does Functional Package Management Enable Reproducible Builds at Scale? Yes.
Technical Papers
Julien Malka LTCI, Télécom Paris, Institut Polytechnique de Paris, France, Stefano Zacchiroli Télécom Paris, Polytechnic Institute of Paris, Théo Zimmermann Télécom Paris, Polytechnic Institute of Paris
Pre-print
14:20
10m
Talk
Refactoring for Dockerfile Quality: A Dive into Developer Practices and Automation Potential
Technical Papers
Emna Ksontini University of Michigan - Dearborn, Meriem Mastouri University of Michigan, Rania Khalsi University of Michigan - Flint, Wael Kessentini DePaul University
14:30
10m
Talk
Smells-sus: Sustainability Smells in IaC
Technical Papers
Seif Kosbar Polytechnique Montréal, Mohammad Hamdaqa Polytechnique Montréal
14:40
10m
Talk
Evidence is All We Need: Do Self-Admitted Technical Debts Impact Method-Level Maintenance?
Technical Papers
Shaiful Chowdhury University of Manitoba, Hisham Kidwai University of Manitoba, Muhammad Asaduzzman University of Windsor
14:50
5m
Talk
DPy: Code Smells Detection Tool for Python
Data and Tool Showcase Track
Aryan Boloori Dalhousie university, Tushar Sharma Dalhousie University
Pre-print
14:55
5m
Talk
CoMRAT: Commit Message Rationale Analysis Tool
Data and Tool Showcase Track
Mouna Dhaouadi University of Montreal, Bentley Oakes Polytechnique Montréal, Michalis Famelis Université de Montréal
Media Attached
15:00
5m
Talk
E2EGit: A Dataset of End-to-End Web Tests in Open Source Projects
Data and Tool Showcase Track
Sergio Di Meglio Università degli Studi di Napoli Federico II, Luigi Libero Lucio Starace Università degli Studi di Napoli Federico II, Valeria Pontillo Vrije Universiteit Brussel, Ruben Opdebeeck Vrije Universiteit Brussel, Coen De Roover Vrije Universiteit Brussel, Sergio Di Martino Università degli Studi di Napoli Federico II
15:05
5m
Talk
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest
Data and Tool Showcase Track
Pre-print
15:10
5m
Talk
pyMethods2Test: A Dataset of Python Tests Mapped to Focal Methods
Data and Tool Showcase Track
Idriss Abdelmadjid University of Nebraska-Lincoln, Robert Dyer University of Nebraska-Lincoln
Pre-print
15:15
5m
Talk
DataTD: A Dataset of Java Projects Including Test Doubles
Data and Tool Showcase Track
Mengzhen Li University of Minnesota, Mattia Fazzini University of Minnesota
15:20
5m
Talk
JPerfEvo: A Tool for Tracking Method-Level Performance Changes in Java Projects
Data and Tool Showcase Track
Kaveh Shahedi Polytechnique Montréal, Maxime Lamothe Polytechnique Montreal, Foutse Khomh Polytechnique Montréal, Heng Li Polytechnique Montréal
16:00 - 17:30
Plenary: ClosingProgram / Vision and Reflection at 214
Chair(s): Gabriele Bavota Software Institute @ Università della Svizzera Italiana
16:00
30m
Talk
Future of AI4SE: From Code Generation to Software Engineering?
Vision and Reflection
Baishakhi Ray Columbia University, New York;
16:30
30m
Talk
Reshaping MSR (and SE) empirical evaluations in 2030
Vision and Reflection
Massimiliano Di Penta University of Sannio, Italy
17:00
15m
Day closing
Closing Session
Program
Bram Adams Queen's University, Olga Baysal Carleton University, Ayushi Rastogi University of Groningen, The Netherlands
17:15
15m
Day closing
MSR 2026 Presentation
Program

Accepted Papers

Title
Analyzing Dependency Clusters and Security Risks in the Maven Central Repository
Mining Challenge
Analyzing Vulnerability Overestimation in Software Projects
Mining Challenge
Cascading Effects: Analyzing Project Failure Impact in the Maven Central Ecosystem
Mining Challenge
Characterizing Packages for Vulnerability Prediction
Mining Challenge
Chasing the Clock: How Fast Are Vulnerabilities Fixed in the Maven Ecosystem?
Mining Challenge
Decoding Dependency Risks: A Quantitative Study of Vulnerabilities in the Maven Ecosystem
Mining Challenge
Dependency Dilemmas: A Comparative Study of Independent and Dependent Artifacts in Maven Ecosystem
Mining Challenge
Dependency Update Adoption Patterns in the Maven Software Ecosystem
Mining Challenge
Do Developers Depend on Deprecated Library Versions? A Mining Study of Log4j
Mining Challenge
Faster Releases, Fewer Risks: A Study on Maven Artifact Vulnerabilities and Lifecycle Management
Mining Challenge
Insights into Dependency Maintenance Trends in the Maven Ecosystem
Mining Challenge
Insights into Vulnerability Trends in Maven Artifacts: Recurrence, Popularity, and User Behavior
Mining Challenge
Mining for Lags in Updating Critical Security Threats: A Case Study of Log4j Library
Mining Challenge
On the Evolution of Unused Dependencies in Java Project Releases: An Empirical Study
Mining Challenge
Out of Sight, Still at Risk: The Lifecycle of Transitive Vulnerabilities in Maven
Mining Challenge
Popularity and Innovation in Maven Central
Mining Challenge
Software Bills of Materials in Maven Central
Mining Challenge
The Ripple Effect of Vulnerabilities in Maven Central: Prevalence, Propagation, and Mitigation Challenges
Mining Challenge
Tracing Vulnerabilities in Maven: A Study of CVE lifecycles and Dependency Networks
Mining Challenge
Pre-print
Understanding Abandonment and Slowdown Dynamics in the Maven Ecosystem
Mining Challenge
Pre-print
Understanding Software Vulnerabilities in the Maven Ecosystem: Patterns, Timelines, and Risks
Mining Challenge
Understanding the Popularity of Packages in Maven Ecosystem
Mining Challenge

Call for Mining Challenge Papers

NEW: Challenge preprint available here

Using package managers is a simple and common method for reusing code through project dependencies. However, these direct dependencies can themselves rely on additional packages, resulting in indirect dependencies. It may then become complex to get a grasp of the whole set of dependencies of a project. Beyond individual projects, a deep understanding of how software ecosystems work and evolve is also a critical prerequisite for achieving sustained success in software development.

This year’s mining challenge focuses on dependencies and dependency ecosystem analysis using the Goblin framework that has been presented at the previous edition of the MSR conference. Goblin is composed of a Neo4J Maven Central dependency graph and a tool called Weaver for on-demand metric weaving into dependency graphs. As a whole, Goblin is a customizable framework for ecosystem and dependency analysis.

Challenge

The analysis of a software ecosystem graph presents numerous research opportunities, allowing for the investigation of various questions in areas such as structural analysis, community detection, dependency optimization, and risk assessment within the Maven Central ecosystem.

The following suggested questions outline potential research inquiries: Questions in groups 1 to 5 can be addressed with the dependency graph database alone, questions in group 6 require the additional use of the Weaver, and questions in group 7 illustrate examples of inquiries that would require an extension of the Weaver.

  1. Ecosystem evolution
    i. What are the patterns in the growth of the Maven Central graph across different time periods?
    ii. Do libraries tend to use more dependencies than in the past?
    iii. Is the rhythm of library releases higher than in the past, and how has this rhythm evolved over time?
    iv. Does the emergence of project management methods (e.g., agile methods) have any impact on the release rhythm of libraries?
    v. To what extent does the ecosystem contain unmaintained libraries?
    vi. How do projects with unmaintained dependencies cope with the challenges they face?
  2. Clustering
    i. Can we deduce different clusters from Maven Central’s comprehensive dependency graph? How do these clusters interact with one another?
    ii. Can dependency-based clustering reveal domain-specific groupings, and how well do they align with known categorizations of projects?
    iii. How can clustering be used to identify high-risk clusters in the Maven Central ecosystem?
    iv. Which artifacts serve as the most crucial dependencies for the ecosystem (i.e., most depended upon)?
    v. How do these central nodes affect the overall health and stability of the ecosystem?
  3. Dependency update
    i. How often do projects update their dependencies, and what factors influence this frequency (e.g., project size, popularity, type)?
    ii. Whenever an artifact releases a new version, how do its dependents react?
    iii. How does the removal or failure of certain projects affect the overall network (e.g., log4j Vulnerability)?
    iv. How do major versus minor dependency updates differ in frequency and impact?
    v. Do projects tend to avoid major updates due to the potential for breaking changes?
  4. Trends
    i. How has the adoption of new frameworks (e.g., Spring Boot, Microservices) changed the dependency structures in Maven Central?
    ii. What impact do modern dependency management tools (e.g., Dependabot) have on the ecosystem?
    iii. How does the adoption of newer Java versions influence dependency graphs?
    iv. Does an artifact’s number of dependents correlate with other popularity metrics such as GitHub stars?
  5. Graph theory
    i. How do metrics such as degree distribution, clustering coefficient, and average path length characterize the dependency graph?
    ii. Is the graph scale-free, small-world, or does it exhibit other known graph structures?
    iii. Are certain types of projects more likely to be central (hubs) or peripheral (leaves) in the graph structure?
    iv. Is the graph made up of connected components with no relationship between them?
    v. How do shortest path lengths between projects vary, and what does this tell us about the overall connectivity of the ecosystem?
  6. Vulnerability
    i. How do vulnerabilities propagate through the dependency network, and which projects are most affected?
    ii. What proportion of releases have vulnerabilities? What is the proportion of releases directly and transitively impacted?
    iii. What is the average time taken to patch a vulnerability in a dependency?
    iv. How do users of an artifact react to the discovery of a vulnerability in that artifact?
  7. Licensing and Compliance
    i. Are there dominant license types, and how do they influence the usage and distribution of projects?
    ii. How does the choice of licenses affect the artifact graph structure?
    iii. What percentage of projects have conflicting licenses within their dependency trees?

Description of the Challenge Dataset and Tooling

The Goblin framework (see figure below) is organized around a Neo4J database of the whole Maven Central dependency graph. This database can be created and updated incrementally using Goblin Miner. The database can be queried directly using Cypher (the Neo4j query language) or through the Goblin Weaver tool. More generally, Goblin Weaver comes with an API for the on-demand weaving of user-programmed metrics of interest (added values) into the dependency graph. Several such metrics are already available: CVEs, popularity, freshness and release rhythm. As a whole, Goblin aims to be a customizable framework for working on software dependencies at the ecosystem level.

image

The dependency graph database is composed of two node types (for libraries and for their releases) and two edge types (from releases to their dependencies and from libraries to their releases). The nodes for libraries (type Artifact) contain the Maven id (g.a) information. The nodes for releases (type Release) contain the Maven id (g.a.v), the release timestamp, and the version information. The edges for dependencies (type dependency) are from Release nodes to Artifact nodes and contain target version (which can be a range) and scope (compile, test, etc). The edges for versioning (type relationship_AR) edges are from Artifact nodes to Release nodes.

The latest version of our dataset, dated August 30th, 2024, contains 15,117,217 nodes (658,078 libraries and 14,459,139 releases) and 134,119,545 edges (119,660,406 dependencies and 14,459,139 versioning edges).

We also provide a second version of this dataset enriched with the Weaver metrics, which has the effect of creating new “AddedValue” nodes in the database containing the metrics (CVE (dated September 4, 2024), freshness, popularity and speed).

The Goblin Miner allows you to update the dependency graph database or recreate it from scratch. The Miner Java source code is available.

The Goblin Weaver REST API is available as an alternative for direct access to the database using the Cypher language and for on-demand enrichment of the dependency graph with new information. A memoization principle is available to avoid re-computing enrichments, as soon as the base graph is not re-computed or incremented. For this, new kinds of nodes (type AddedValue) and edges (type addedValues from an Artifact or Release node to an AddedValue node) are used in the graph database. One should be careful, as the graph is large, calculating metrics (especially aggregate ones) for the whole graph can be time-consuming. The Weaver Java source code is available.

A tutorial is available online on this GitHub repository. The issue tracking system will also enable one to ask questions on the datasets and tooling.

How to Participate in the Challenge

First, familiarize yourself with the Goblin framework:

Use the dataset to answer your research questions, and report your findings in a four-page challenge paper that you submit to our challenge. If your paper is accepted, present your results at MSR 2025 in Ottawa, Canada!

Submission

A challenge paper should describe the results of your work by providing an introduction to the problem you address and why it is worth studying, the version of the dataset you used, the approach and tools you used, your results and their implications, and conclusions. Make sure your report highlights the contributions and the importance of your work. See also our open science policy regarding the publication of software and additional data you used for the challenge.

To ensure clarity and consistency in research submissions:

  • When detailing methodologies or presenting findings, authors should specify which snapshot/version of the Goblin dataset (and the Weaver version if used) was utilized.
  • Given the continuous updates to the dataset, authors are reminded to be precise in their dataset references. This will help maintain transparency and ensure consistent replication of results.

Submissions must conform to the IEEE formatting instructions IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options).

Submissions to the Challenge Track can be made via the submission site by the submission deadline. We encourage authors to upload their paper info early (the PDF can be submitted later) to properly enter conflicts for anonymous reviewing. All submissions must adhere to the following requirements:

  • Submissions must not exceed the page limit (4 pages plus 1 additional page of references). The page limit is strict, and it will not be possible to purchase additional pages at any point in the process (including after acceptance).
  • Submissions must strictly conform to the IEEE conference proceedings formatting instructions specified above. Alterations of spacing, font size, and other changes that deviate from the instructions may result in desk rejection without further review.
  • Submissions must not reveal the authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular, the authors’ names must be omitted from the submission and references to their prior work should be in the third person. Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page from ICSE.
  • Submissions should consider the ethical implications of the research conducted within a separate section before the conclusion.
  • The official publication date is the date the proceedings are made available in the ACM or IEEE Digital Libraries. This date may be up to two weeks prior to the first day of ICSE 2025. The official publication date affects the deadline for any patent filings related to published work.
  • Purchases of additional pages in the proceedings are not allowed.

Any submission that does not comply with these requirements is likely to be desk rejected by the PC Chairs without further review. In addition, by submitting to the MSR Challenge Track, the authors acknowledge that they are aware of and agree to be bound by the following policies:

  • The ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ. In particular, papers submitted to MSR 2025 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for MSR 2025. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases (including immediate rejection and reporting of the incident to ACM/IEEE). To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
  • The authorship policy of the ACM and the authorship policy of the IEEE.

Upon notification of acceptance, all authors of accepted papers will be asked to fill a copyright form and will receive further instructions for preparing the camera-ready version of their papers. At least one author of each paper is expected to register and present the paper at the MSR 2025 conference. All accepted contributions will be published in the electronic proceedings of the conference.

This year’s mining challenge and the data can be cited as:

@inproceedings{
    title={Navigating and Exploring Software Dependency Graphs using Goblin},
    author={Jaime, Damien and El Haddad, Joyce and Poizat, Pascal},
    year={2025},
    booktitle={Proceedings of the International Conference on Mining Software Repositories (MSR 2025)},
}

A preprint is available online: https://hal.science/hal-04777703

Submission Site

Papers must be submitted through HotCRP: https://msr2025-challenge.hotcrp.com/

Important Dates

AoE: Anywhere on Earth

  • Abstract Deadline: Dec 3, 2024 AoE
  • Paper Deadline: Dec 6, 2024 AoE
  • Author Notification: Jan 12, 2025 AoE
  • Camera Ready Deadline: Feb 5, 2025 AoE

Open Science Policy

Openness in science is key to fostering progress via transparency, reproducibility and replicability. Our steering principle is that all research output should be accessible to the public and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles. To increase reproducibility and replicability, we encourage all contributing authors to disclose:

  • the source code of the software they used to retrieve and analyze the data
  • the (anonymized and curated) empirical data they retrieved in addition to the Goblin Maven dataset
  • a document with instructions for other researchers describing how to reproduce or replicate the results

Already upon submission, authors can privately share their anonymized data and software on archives such as Zenodo or Figshare (tutorial available here). Zenodo accepts up to 50GB per dataset (more upon request). There is no need to use Dropbox or Google Drive. After acceptance, data and software should be made public so that they receive a DOI and become citable. Zenodo and Figshare accounts can easily be linked with GitHub repositories to automatically archive software releases. In the unlikely case that authors need to upload terabytes of data, Archive.org may be used.

We recognise that anonymizing artifacts such as source code is more difficult than preserving anonymity in a paper. We ask authors to take a best effort approach to not reveal their identities. We will also ask reviewers to avoid trying to identify authors by looking at commit histories and other such information that is not easily anonymized. Authors wanting to share GitHub repositories may want to look into using https://anonymous.4open.science/ which is an open source tool that helps you to quickly double-blind your repository.

We encourage authors to self-archive pre- and post prints of their papers in open, preserved repositories such as arXiv.org. This is legal and allowed by all major publishers including ACM and IEEE and it lets anybody in the world reach your paper. Note that you are usually not allowed to self-archive the PDF of the published article (that is, the publisher proof or the Digital Library version). Please note that the success of the open science initiative depends on the willingness (and possibilities) of authors to disclose their data and that all submissions will undergo the same review process independent of whether or not they disclose their analysis code or data. We encourage authors who cannot disclose industrial or otherwise non-public data, for instance due to non-disclosure agreements, to provide an explicit (short) statement in the paper.

Best Mining Challenge Paper Award

As mentioned above, all submissions will undergo the same review process independently of whether or not they disclose their analysis code or data. However, only accepted papers for which code and data are available on preserved archives, as described in the open science policy, will be considered by the program committee for the best mining challenge paper award.

Best Student Presentation Award

Like in the previous years, there will be a public voting during the conference to select the best mining challenge presentation. This award often goes to authors of compelling work who present an engaging story to the audience. Only students can compete for this award.

Call for Mining Challenge Proposals

The International Conference on Mining Software Repositories (MSR) has hosted a mining challenge since 2006. With this challenge, we call upon everyone interested to apply their tools to a common dataset. The challenge is for researchers and practitioners to bravely use their mining tools and approaches on a dare.

One of the secret ingredients behind the success of the International Conference on Mining Software Repositories (MSR) is its annual Mining Challenge, in which MSR participants can showcase their techniques, tools, and creativity on a common data set. In true MSR fashion, this data set is a real data set contributed by researchers in the community, solicited through an open call. There are many benefits of sharing a data set for the MSR Mining Challenge. The selected challenge proposal explaining the data set will appear in the MSR 2025 proceedings, and the challenge papers using the data set will be required to cite the challenge proposal or an existing paper of the researchers about the selected data set. Furthermore, the authors of the data set will join the MSR 2025 organizing committee as Mining Challenge (co-)chair(s), who will manage the reviewing process (e.g., recruiting a Challenge PC, managing submissions, and reviewing assignments). Finally, it is not uncommon for challenge data sets to feature in MSR and other publications well after the edition of the conference in which they appear!

If you would like to submit your data set for consideration for the 2025 MSR Mining Challenge, prepare a short proposal (1-2 pages plus appendices, if needed) containing the following information:

  1. Title of data set.
  2. High-level overview:
    • Short description, including what types of artifacts the data set contains.
    • Summary statistics (how many artifacts of different types).
  3. Internal structure:
    • How are the data structured and organized?
    • (Link to) Schema, if applicable
  4. How to access:
    • How can the data set be obtained?
    • What are recommended ways to access it? Include examples of specific tools, shell commands, etc, if applicable.
    • What skills, infrastructure, and/or credentials would challenge participants need to effectively work with the data set?
  5. What kinds of research questions do you expect challenge participants could answer?
  6. A link to a (sub)sample of the data for the organizing committee to pursue (e.g., via GitHub, Zenodo, Figshare).

Submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options). Submit your proposal here.

The first task of the authors of the selected proposal will be to prepare the Call for Challenge Papers, which outlines the expected content and structure of submissions, as well as the technical details of how to access and analyze the data set. This call will be published on the MSR website on September 2nd. By making the challenge data set available by late summer, we hope that many students will be able to use the challenge data set for their graduate class projects in the Fall semester.

Important dates:

AoE: Anywhere on Earth

  • Submission site: https://msr2025.hotcrp.com
  • Deadline for proposals: August 19, 2024
  • Notification: August 26, 2024
  • Call for Challenge Papers Published: September 2, 2024