ASE 2025
Sun 16 - Thu 20 November 2025 Seoul, South Korea
Tue 18 Nov 2025 14:10 - 14:20 at Grand Hall 1 - Program Analysis 1 Chair(s): Chaiyong Ragkhitwetsagul

Extended Berkeley Packet Filter (eBPF) allows developers to extend Linux kernel functionality without modifying its source code. To ensure system safety, an in-kernel safety checker, the verifier, enforces strict safety constraints (e.g., a limited program size) on eBPF programs loaded into the kernel. These constraints, combined with eBPF’s performance-critical use cases, make effective optimization essential. However, existing compilers (e.g., Clang) offer limited optimization support, and many semantics-preserving transformations are rejected by the verifier, which makes handcrafted optimization rule design both challenging and limited in effectiveness.

Superoptimization overcomes the limitations of rule-based methods by automatically discovering optimal transformations, but its high computational cost limits scalability. To address this, we propose EPSO, a caching-based superoptimizer that discovers rewrite rules via offline superoptimization, and reuses them to achieve high-quality optimizations with minimal runtime overhead. We evaluate EPSO on benchmarks from the Linux kernel and several eBPF-based projects, including Cilium, Katran, hXDP, Sysdig, Tetragon, and Tracee. EPSO discovers 624 rewrite rules and achieves up to 68.87% (avg. 20.01%) reduction in program size compared to Clang’s best output, outperforming the state-of-the-art BPF optimizer K2 on all benchmarks and Merlin on 81.60% of them. Additionally, EPSO reduces program runtime by an average of 6.60%, improving throughput and lowering latency in network applications.

Tue 18 Nov

Displayed time zone: Seoul change

14:00 - 15:30
Program Analysis 1Research Papers / Journal-First at Grand Hall 1
Chair(s): Chaiyong Ragkhitwetsagul Mahidol University
14:00
10m
Talk
Exploring Static Taint Analysis in LLMs: A Dynamic Benchmarking Framework for Measurement and Enhancement
Research Papers
Haoran Zhao Fudan University, Lei Zhang Fudan University, Keke Lian Fudan University, Fute Sun Fudan University, Bofei Chen Fudan University, Yongheng Liu Fudan University, Zhiyu Wu Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
14:10
10m
Talk
EPSO: A Caching-Based Efficient Superoptimizer for BPF Bytecode
Research Papers
Qian Zhu Nanjing University, Yuxuan Liu Nanjing University, Ziyuan Zhu Nanjing University, Shangqing Liu Nanjing University, Lei Bu Nanjing University
14:20
10m
Talk
GNNContext: GNN-based Code Context Prediction for Programming Tasks
Journal-First
Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, Shun Liu Zhejiang University, Kaiwen Yang Zhejiang University, David Lo Singapore Management University, Xiaohu Yang Zhejiang University
14:30
10m
Talk
R3-Bench: Reproducible Real-world Reverse Engineering Dataset for Symbol Recovery
Research Papers
Muzhi Yu Peking University and Alibaba Group, Zhengran Zeng Peking University, Wei Ye Peking University, Jinan Sun Peking University, Xiaolong Bai Alibaba Group, Shikun Zhang Peking University
14:40
10m
Talk
Protecting Source Code Privacy When Hunting Memory Bugs
Research Papers
Jielun Wu Nanjing University, Bing Shui Nanjing University, Hongcheng Fan Nanjing University, Shengxin Wu Nanjing University, Rongxin Wu Xiamen University, Yang Feng Nanjing University, Baowen Xu Nanjing University, Qingkai Shi Nanjing University
14:50
10m
Talk
Latra: A Template-Based Language-Agnostic Transformation Framework for Effective Program Reduction
Research Papers
Zhenyang Xu University of Waterloo, Yiran Wang University of Waterloo, Yongqiang Tian Monash University, Mengxiao Zhang University of Waterloo, Chengnian Sun University of Waterloo
15:00
10m
Talk
When Control Flows Deviate: Directed Grey-box Fuzzing with Probabilistic Reachability Analysis
Research Papers
Peihong Lin National University of Defense Technology, Pengfei Wang National University of Defense Technology, Xu Zhou National University of Defense Technology, Wei Xie University of Science and Technology of China, Xin Ren National University of Defense Technology, Kai Lu National University of Defense Technology, China
15:10
10m
Talk
EditFusion: Resolving Code Merge Conflicts via Edit Selection
Research Papers
Changxin Wang Nanjing University, Yiming Ma Nanjing University, Lei Xu Nanjing University, Weifeng Zhang Nanjing University of Posts and Telecommunications
15:20
10m
Talk
Detecting Semantic Clones of Unseen Functionality
Research Papers
Konstantinos Kitsios University of Zurich, Francesco Sovrano Collegium Helveticum, ETH Zurich, Switzerland; Department of Informatics, University of Zurich, Switzerland, Earl T. Barr University College London, Alberto Bacchelli University of Zurich
Pre-print