ASE 2025
Sun 16 - Thu 20 November 2025 Seoul, South Korea

This program is tentative and subject to change.

Wed 19 Nov 2025 16:10 - 16:20 at Grand Hall 5 - Security 7

Software ecosystems like Maven Central play a crucial role in modern software supply chains by providing repositories for libraries and build plugins. However, the separation between binaries and their corresponding source code in Maven Central presents a significant challenge, particularly when it comes to linking binaries back to their original build environment. This lack of transparency poses security risks, as approximately 84% of the top 1200 commonly used artifacts are not built using a transparent CI/CD pipeline. Consequently, users must place a significant amount of trust not only in the source code but also in the environment in which these artifacts are built.

Rebuilding software artifacts from source provides a robust solution to improve supply chain security. This approach allows for a deeper review of code, verification of binary-source equivalence, and control over dependencies. However, challenges arise due to variations in build environments, such as JDK versions and build commands, which can lead to build failures. Additionally, ensuring that all dependencies are rebuilt from source across large and complex dependency graphs further complicates the process. In this paper, we introduce an extension to Macaron, an industry-grade open-source supply chain security framework, to automate the rebuilding of Maven artifacts from source. Our approach improves upon existing tools, by offering better performance in source code detection and automating the extraction of build specifications from GitHub Actions workflows. We also present a comprehensive root cause analysis of build failures in Java projects and propose a scalable solution to automate the rebuilding of artifacts, ultimately enhancing security and transparency in the open-source supply chain.

This program is tentative and subject to change.

Wed 19 Nov

Displayed time zone: Seoul change

16:00 - 17:00
16:00
10m
Talk
RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps
NIER Track
Tiezhu Sun University of Luxembourg, Marco Alecci University of Luxembourg, Yewei Song University of Luxembourg, Xunzhu Tang University of Luxembourg, Kisub Kim DGIST, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
16:10
10m
Talk
Unlocking Reproducibility: Automating re-Build Process for Open-Source Software
Industry Showcase
16:20
10m
Talk
JSidentify-V2: Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection
Industry Showcase
Zhihao Li Tencent Inc., Chaozheng Wang The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Xinyong Peng Tencent Inc., Qun Xia Tencent Inc., Haochuan Lu Tencent, Ting Xiong Tencent Inc., Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Shuai Wang Hong Kong University of Science and Technology, Yuetang Deng Tencent, Huafeng Ma Tencent Inc.
16:30
10m
Talk
IDBFuzz: Web Storage DataBase Fuzzing with Controllable Semantics
NIER Track
Jingyi Chen Jiangsu University, Jinfu Chen Jiangsu University, Saihua Cai Jiangsu University, Shengran Wang Jiangsu University
16:40
10m
Talk
SCOPE: Evaluating and Enhancing Permission Explanation Transparency in Mobile Apps
Industry Showcase
Liu Wang Beijing University of Posts and Telecommunications, Tianshu Zhou Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, Xiyuan Liu Freshippo-Alibaba Group, Yi Wang
16:50
10m
Talk
ApkArmor: Low-Cost Lightweight Anti-Decompilation Techniques for Android Apps
Industry Showcase
Jiayang Liu Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Pengcheng Xia Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology