ASE 2025
Sun 16 - Thu 20 November 2025 Seoul, South Korea

This program is tentative and subject to change.

Wed 19 Nov 2025 14:10 - 14:20 at Grand Hall 1 - Program Analysis 2

The eBPF technology is widely used for many applications including tracing, packet filtering, network usage monitoring, and so on. The versatility of eBPF allows the kernel’s capabilities to be extended without needing to modify source code or load kernel modules. However, the eBPF subsystem may introduce new bugs that could lead to crashes, data loss, and other issues that can negatively impact system stability, reliability, availability, security, and overall performance. Specifically, locking violations, which occur when locks are not used correctly, can lead to problems like deadlocks and system hangs. Since eBPF operates at the kernel level, errors here have far-reaching consequences.

To tackle this issue, we present Gopher, a tool for detecting locking violations in the eBPF runtime. Gopher uses static analysis to (1) detect cases of context confusion where incorrect locking primitives are used in eBPF helper functions given their execution context, and (2) identify locks in helper functions that can be called recursively using nested eBPF programs. Both of these situations could result in deadlocks. So far, Gopher has identified 34 locking violation bugs in the eBPF subsystem in Linux, only 5 of which were previously found by Syzbot.

This program is tentative and subject to change.

Wed 19 Nov

Displayed time zone: Seoul change

14:00 - 15:30
Program Analysis 2Research Papers at Grand Hall 1
14:00
10m
Talk
Incremental Program Analysis in the Wild: An Empirical Study on Real-World Program Changes
Research Papers
Xizao Wang Nanjing University, Xiangrong Bin Nanjing University, Lanxin Huang Nanjing University, Shangqing Liu Nanjing University, Jianhua Zhao Nanjing University, China, Lei Bu Nanjing University
14:10
10m
Talk
Spinner: Detecting Locking Violations in the eBPF Runtime
Research Papers
Priya Govindasamy University of California, Irvine, Joseph Bursey University of California, Irvine, Hsin-Wei Hung Meta, Ardalan Amiri Sani University of California, Irvine
14:20
10m
Talk
Towards More Accurate Static Analysis for Taint-style Bug Detection in Linux Kernel
Research Papers
Haonan Li University of California at Riverside, USA, Hang Zhang Indiana University, Kexin Pei The University of Chicago, Zhiyun Qian University of California at Riverside, USA
Pre-print
14:30
10m
Talk
Automated Insertion of Flushes and Fences for Persistency
Research Papers
Yutong Guo University of California, Irvine, Weiyu Luo University of California, Irvine, Brian Demsky University of California at Irvine
14:40
10m
Talk
DIFFFIX: Incrementally Fixing AST Diffs via Context and Type Information
Research Papers
Guofeng Zeng University of Science and Technology Beijing, Chang-ai Sun University of Science and Technology Beijing, Kai Gao University of Science and Technology Beijing, Huai Liu Swinburne University of Technology
14:50
10m
Talk
Breaking the Traffic Barrier: Unveiling Multi-Format of Protocols via Autonomous Program Exploration
Research Papers
Dingzhao Xue Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Yibo Qu Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Bowen Jiang Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Xin Chen , Shuaizong Si Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
15:00
10m
Talk
Loupe: End-to-End Learning of Loop Unrolling Heuristics for Abstract Interpretation
Research Papers
Maykel Mattar Université Paris-Saclay, CEA, List / Université Bretagne Sud, IRISA, Michele Alberti CEA, LIST, France, Valentin Perrelle CEA, LIST, France, Salah Sadou IRISA & CNRS, Universite Bretagne Sud,France
15:10
10m
Talk
Belief Propagation with Local Structure and Its Applications in Program Analysis
Research Papers
Yiqian Wu Peking University, China, Yifan Chen Peking University, Yingfei Xiong Peking University, Xin Zhang Peking University
15:20
10m
Talk
On the Correctness of Software Merge
Research Papers
Akira Mori National Institute of Advanced Industrial Science and Technology, Japan, Masatomo Hashimoto Chiba Institute of Technology, Japan