ASE 2025
Sun 16 - Thu 20 November 2025 Seoul, South Korea

This program is tentative and subject to change.

Tue 18 Nov 2025 14:40 - 14:50 at Grand Hall 1 - Program Analysis 1

When proving to a third party that a software system is free from critical memory bugs, software vendors often face the problem of having to reveal their source code, so that the third party can scan the source code using static analysis tools. However, such transparency poses a significant threat to vendors, as the source code typically contains proprietary algorithms, core technical innovations, or trade secrets, exposing them to potential intellectual property risks. In this paper, we present a novel solution that offers a balance between transparency and code privacy, so that software vendors can provide minimal source code information but can justify the sufficiency of bug detection. To this end, we propose DIReducer, which reduces source code information, a.k.a. debug information, from non-stripped binaries while preserving its utility for memory bug detection. DIReducer consists of two components: selective pruning and type minimization. The former eliminates redundant debug information, and the latter is proved to be NP-hard and minimizes type-related debug information by reducing it to the classic set-cover problem, which offers feasible and near-optimal solutions. Experimental results show that we can reduce over 90% of debug information while maintaining similar bug detection capability compared to using full debug information.

This program is tentative and subject to change.

Tue 18 Nov

Displayed time zone: Seoul change

14:00 - 15:30
14:00
10m
Talk
Exploring Static Taint Analysis in LLMs: A Dynamic Benchmarking Framework for Measurement and Enhancement
Research Papers
Haoran Zhao Fudan University, Lei Zhang Fudan University, Keke Lian Fudan University, Fute Sun Fudan University, Bofei Chen Fudan University, Yongheng Liu Fudan University, Zhiyu Wu Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
14:10
10m
Talk
EPSO: A Caching-Based Efficient Superoptimizer for BPF Bytecode
Research Papers
Qian Zhu Nanjing University, Yuxuan Liu Nanjing University, Ziyuan Zhu Nanjing University, Shangqing Liu Nanjing University, Lei Bu Nanjing University
14:20
10m
Talk
GNNContext: GNN-based Code Context Prediction for Programming Tasks
Journal-First Track
Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, Shun Liu Zhejiang University, Kaiwen Yang Zhejiang University, David Lo Singapore Management University, Xiaohu Yang Zhejiang University
14:30
10m
Talk
R3-Bench: Reproducible Real-world Reverse Engineering Dataset for Symbol Recovery
Research Papers
Muzhi Yu Peking University and Alibaba Group, Zhengran Zeng Peking University, Wei Ye Peking University, Jinan Sun Peking University, Xiaolong Bai Alibaba Group, Shikun Zhang Peking University
14:40
10m
Talk
Protecting Source Code Privacy When Hunting Memory Bugs
Research Papers
Jielun Wu Nanjing University, Bing Shui Nanjing University, Hongcheng Fan Nanjing University, Shengxin Wu Nanjing University, Rongxin Wu Xiamen University, Yang Feng Nanjing University, Baowen Xu Nanjing University, Qingkai Shi Nanjing University
14:50
10m
Talk
Latra: A Template-Based Language-Agnostic Transformation Framework for Effective Program Reduction
Research Papers
Zhenyang Xu University of Waterloo, Yiran Wang University of Waterloo, Yongqiang Tian Monash University, Mengxiao Zhang University of Waterloo, Chengnian Sun University of Waterloo
15:00
10m
Talk
When Control Flows Deviate: Directed Grey-box Fuzzing with Probabilistic Reachability Analysis
Research Papers
Peihong Lin National University of Defense Technology, Pengfei Wang National University of Defense Technology, Xu Zhou National University of Defense Technology, Wei Xie University of Science and Technology of China, Xin Ren National University of Defense Technology, Kai Lu National University of Defense Technology, China
15:10
10m
Talk
EditFusion: Resolving Code Merge Conflicts via Edit Selection
Research Papers
Changxin Wang Nanjing University, Yiming Ma Nanjing University, Lei Xu Nanjing University, Weifeng Zhang Nanjing University of Posts and Telecommunications
15:20
10m
Talk
Detecting Semantic Clones of Unseen Functionality
Research Papers
Konstantinos Kitsios University of Zurich, Francesco Sovrano Collegium Helveticum, ETH Zurich, Switzerland; Department of Informatics, University of Zurich, Switzerland, Earl T. Barr University College London, Alberto Bacchelli University of Zurich
Pre-print