Write a Blog >>
ICSE 2022
Sun 8 - Fri 27 May 2022
Wed 11 May 2022 12:25 - 12:30 at ICSE room 2-even hours - Software Security 8 Chair(s): Barbara Russo
Wed 11 May 2022 22:10 - 22:15 at ICSE room 2-even hours - Software Security 6 Chair(s): Travis Breaux
Thu 26 May 2022 09:05 - 09:10 at Room 301+302 - Papers 12: Software Testing 1 Chair(s): Barbora Buhnova
Thu 26 May 2022 13:30 - 15:00 at Ballroom Gallery - Posters 2

The notion of Attack Surface refers to the critical points on the boundary of a software system which are accessible from outside or contain valuable content for attackers. The ability to identify attack surface components of software system has a significant role in effectiveness of vulnerability analysis approaches. Most prior works focus on the analysis techniques and there has not been much attempt to create a comprehensive list of attack surface components. Although limited number of studies have focused on attack surface analysis, they defined attack surface components based on some general hypotheses (such as Target, Enabler, Channel etc.) to evaluate security risk of specific types of software applications. In this study, we leverage a qualitative analysis approach to empirically identify an extensive list of attack surface components. To this end, we conduct a Grounded Theory (GT) analysis on 1444 previously published vulnerability reports and weaknesses with a team of three software developers and security experts. We extract vulnerability information from two publicly available repositories: 1) Common Vulnerabilities and Exposures (CVE), and 2) Common Weakness Enumeration (CWE). We ask three key questions: where the attacks come from, what they target, and how they emerge, and to help answer these questions we define three core categories for attack surface components: Entry points, Targets, and Mechanisms. We extract attack surface concepts related to each category from collected vulnerability information using the GT analysis and provide a comprehensive categorization that represents attack surface components of software systems from various perspectives. The comparison of the proposed attack surface model with the literature shows in the best case previous works cover only 50% of the attack surface components at network level and only 6.7% of the components at code level.

Wed 11 May

Displayed time zone: Eastern Time (US & Canada) change

12:00 - 13:00
12:00
5m
Talk
Omni: automated ensemble with unexpected models against adversarial evasion attack
Journal-First Papers
Rui Shu North Carolina State University, Tianpei Xia North Carolina State University, Laurie Williams North Carolina State University, Tim Menzies North Carolina State University
Link to publication DOI Media Attached
12:05
5m
Talk
What are Weak Links in the npm Supply Chain?
SEIP - Software Engineering in Practice
Nusrat Zahan North Carolina State University, Laurie Williams North Carolina State University, Thomas Zimmermann Microsoft Research, Patrice Godefroid Microsoft Research, USA, Brendan Murphy Microsoft Research, Chandra Maddila Microsoft Research
Pre-print Media Attached
12:10
5m
Talk
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
Technical Track
Michael Cao University of British Columbia, Khaled Ahmed University of British Columbia (UBC), Julia Rubin University of British Columbia
Pre-print Media Attached
12:15
5m
Talk
What the Fork? Finding Hidden Code Clones in npm
Technical Track
Elizabeth Wyss University of Kansas, Lorenzo De Carli Worcester Polytechnic Institute, Drew Davidson University of Kansas
DOI Pre-print Media Attached
12:20
5m
Talk
Less is More: Supporting Developers in Vulnerability Detection during Code Review
Technical Track
Larissa Braz University of Zurich, Christian Aeberhard University of Zurich, Gül Calikli University of Glasgow, Alberto Bacchelli University of Zurich
Link to publication DOI Pre-print Media Attached File Attached
12:25
5m
Talk
A Grounded Theory Based Approach to Characterize Software Attack Surfaces
Technical Track
sara moshtari Rochester Institute of Technology, Ahmet Okutan Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
Pre-print Media Attached
22:00 - 23:00
Software Security 6Technical Track / Journal-First Papers at ICSE room 2-even hours
Chair(s): Travis Breaux Carnegie Mellon University
22:00
5m
Talk
Lags in the release, adoption, and propagation of npm vulnerability fixes
Journal-First Papers
Bodin Chinthanet Nara Institute of Science and Technology, Raula Gaikovina Kula Nara Institute of Science and Technology, Shane McIntosh University of Waterloo, Takashi Ishio Nara Institute of Science and Technology, Akinori Ihara Wakayama University, Kenichi Matsumoto Nara Institute of Science and Technology
Link to publication DOI Pre-print Media Attached
22:05
5m
Talk
Aper: Evolution-Aware Runtime Permission Misuse Detection for Android Apps
Technical Track
Sinan Wang Southern University of Science and Technology, Yibo Wang Northeastern University, Xian Zhan The Hong Kong Polytechnic University, Ying Wang Northeastern University, China, Yepang Liu Southern University of Science and Technology, Xiapu Luo Hong Kong Polytechnic University, Shing-Chi Cheung Hong Kong University of Science and Technology
DOI Pre-print Media Attached
22:10
5m
Talk
A Grounded Theory Based Approach to Characterize Software Attack Surfaces
Technical Track
sara moshtari Rochester Institute of Technology, Ahmet Okutan Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
Pre-print Media Attached
22:15
5m
Talk
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source SoftwareNominated for Distinguished Paper
Technical Track
David Reid University of Tennessee, Mahmoud Jahanshahi Research Assistant, University of Tennessee Knoxville, Audris Mockus The University of Tennessee
DOI Pre-print Media Attached
22:20
5m
Talk
MVD: Memory-related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks
Technical Track
Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Lili Bo Yangzhou University, Rongxin Wu Xiamen University, Bin Li Yangzhou University, Chuanqi Tao Nanjing University of Aeronautics and Astronautics
DOI Pre-print Media Attached
22:25
5m
Talk
VulCNN: An Image-inspired Scalable Vulnerability Detection System
Technical Track
Yueming Wu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Shihan Dou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Duo Xu Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
DOI Pre-print Media Attached

Thu 26 May

Displayed time zone: Eastern Time (US & Canada) change

09:00 - 10:30
Papers 12: Software Testing 1Technical Track / NIER - New Ideas and Emerging Results / Journal-First Papers at Room 301+302
Chair(s): Barbora Buhnova Masaryk University
09:00
5m
Talk
Less is More: Supporting Developers in Vulnerability Detection during Code Review
Technical Track
Larissa Braz University of Zurich, Christian Aeberhard University of Zurich, Gül Calikli University of Glasgow, Alberto Bacchelli University of Zurich
Link to publication DOI Pre-print Media Attached File Attached
09:05
5m
Talk
A Grounded Theory Based Approach to Characterize Software Attack Surfaces
Technical Track
sara moshtari Rochester Institute of Technology, Ahmet Okutan Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
Pre-print Media Attached
09:10
5m
Talk
SymTuner: Maximizing the Power of Symbolic Execution by Adaptively Tuning External ParametersDistinguished Paper Award
Technical Track
Sooyoung Cha Sungkyunkwan University, Myungho Lee Korea University, Seokhyun Lee Korea University, South Korea, Hakjoo Oh Korea University
Pre-print Media Attached
09:15
5m
Talk
Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source
Technical Track
Anjiang Wei Stanford University, Yinlin Deng University of Illinois at Urbana-Champaign, Chenyuan Yang Nanjing University, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print Media Attached
09:20
5m
Talk
Automatic Detection of Performance Bugs in Database Systems using Equivalent Queries
Technical Track
Xinyu Liu Georgia Institute of Technology, Qi Zhou Facebook, Joy Arulraj Georgia Institute of Technology, Alessandro Orso Georgia Tech
Pre-print Media Attached
09:25
5m
Talk
Preempting Flaky Tests via Non-Idempotent-Outcome Tests
Technical Track
Anjiang Wei Stanford University, Pu Yi Peking University, Zhengxi Li University of Illinois Urbana-Champaign, Tao Xie Peking University, Darko Marinov University of Illinois at Urbana-Champaign, Wing Lam University of Illinois at Urbana-Champaign
Pre-print Media Attached
09:30
5m
Talk
A Family of Experiments on Test-Driven Development
Journal-First Papers
Adrian Santos Parrilla University of Oulu, Sira Vegas Universidad Politecnica de Madrid, Oscar Dieste Universidad Politécnica de Madrid, Fernando Uyaguari ETAPA Telecommunications Company, Ayse Tosun Istanbul Technical University, Davide Fucci Blekinge Institute of Technology, Burak Turhan University of Oulu, Giuseppe Scanniello University of Basilicata, Simone Romano University of Bari, Itir Karac University of Oulu, Marco Kuhrmann Reutlingen University, Vladimir Mandić Faculty of Technical Sciences, University of Novi Sad, Robert Ramač Faculty of Technical Sciences, University of Novi Sad, Dietmar Pfahl University of Tartu, Christian Engblom Ericsson, Jarno Kyykka Ericsson, Kerli Rungi Testlio, Carolina Palomeque ETAPA Telecommunications Company, Jaroslav Spisak PAF, Markku Oivo University of Oulu, Natalia Juristo Universidad Politecnica de Madrid
Link to publication DOI Pre-print Media Attached
09:35
5m
Talk
Towards Property-Based Tests in Natural Language
NIER - New Ideas and Emerging Results
Colin Gordon Drexel University
Pre-print Media Attached
09:40
5m
Talk
Automated Testing of Software that Uses Machine Learning APIs
Technical Track
Chengcheng Wan The University of Chicago, Shicheng Liu University of Chicago, Sophie Xie Whitney Young High School, Yifan Liu University of Chicago, Henry Hoffmann University of Chicago, Michael Maire University of Chicago, Shan Lu University of Chicago
Pre-print Media Attached
13:30 - 15:00
13:30
90m
Talk
"Did You Miss My Comment or What?" Understanding Toxicity in Open Source DiscussionsDistinguished Paper Award
Technical Track
Courtney Miller Carnegie Mellon University, Sophie Cohen Wesleyan University, Daniel Klug Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, USA, Christian Kästner Carnegie Mellon University
Pre-print Media Attached
13:30
90m
Talk
On Debugging the Performance of Configurable Software Systems: Developer Needs and Tailored Tool Support
Technical Track
Miguel Velez Carnegie Mellon University, Pooyan Jamshidi University of South Carolina, Norbert Siegmund Leipzig University, Sven Apel Saarland University, Christian Kästner Carnegie Mellon University
Pre-print Media Attached
13:30
90m
Let's Talk Open-Source - An Analysis of Conference Talks and Community Dynamics
SRC - ACM Student Research Competition
Kimberly Truong Oregon State University
13:30
90m
Talk
The Case for Adaptive Security Interventions
Journal-First Papers
Irum Rauf The Open University, UK, Marian Petre The Open University, Thein Tun , Tamara Lopez The Open University, Paul Lunn The University of Manchester, UK, Dirk van der Linden Northumbria University, John Towse Department of Psychology, University of Lancaster, UK, Helen Sharp The Open University, Mark Levine Lancaster University, Awais Rashid University of Bristol, UK, Bashar Nuseibeh The Open University (UK) & Lero (Ireland)
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses
Journal-First Papers
Linghui Luo Amazon Web Services, Felix Pauck Paderborn University, Germany, Goran Piskachev Fraunhofer IEM, Manuel Benz Paderborn University, Ivan Pashchenko University of Trento, Martin Mory Paderborn University, Eric Bodden , Ben Hermann Technical University Dortmund, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
Link to publication DOI Pre-print Media Attached File Attached
13:30
90m
Talk
Change Is the Only Constant: Dynamic Updates for WorkflowsBest Artifact Award
Technical Track
Daniel Sokolowski University of St. Gallen, Pascal Weisenburger University of St. Gallen, Guido Salvaneschi University of St. Gallen
DOI Pre-print Media Attached
13:30
90m
Talk
FeatCompare: Feature Comparison for Competing Mobile Apps Leveraging User Reviews
Journal-First Papers
Maram Assi Queen's University, Safwat Hassan Thompson Rivers University, Yuan Tian Queens University, Kingston, Canada, Ying Zou Queen's University, Kingston, Ontario
Link to publication Pre-print Media Attached
13:30
90m
Talk
Scratch as Social Network: Topic Modeling and Sentiment Analysis in Scratch Projects
SEIS - Software Engineering in Society
Isabella Graßl University of Passau, Gordon Fraser University of Passau
Pre-print Media Attached
13:30
90m
Talk
Deep Learning based Vulnerability Detection: Are We There Yet?
Journal-First Papers
Saikat Chakraborty Columbia University, Rahul Krishna IBM Research, Yangruibo Ding Columbia University, Baishakhi Ray Columbia University
Link to publication DOI Media Attached
13:30
90m
Talk
Static Inference Meets Deep Learning: A Hybrid Type Inference Approach for PythonNominated for Distinguished Paper
Technical Track
Yun Peng The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Zongjie Li The Hong Kong University of Science and Technology, Bowei Gao Harbin Institute of Technology, Shenzhen, David Lo Singapore Management University, Qirun Zhang Georgia Institute of Technology, USA, Michael Lyu The Chinese University of Hong Kong
DOI Pre-print Media Attached
13:30
90m
Talk
Preempting Flaky Tests via Non-Idempotent-Outcome Tests
Technical Track
Anjiang Wei Stanford University, Pu Yi Peking University, Zhengxi Li University of Illinois Urbana-Champaign, Tao Xie Peking University, Darko Marinov University of Illinois at Urbana-Champaign, Wing Lam University of Illinois at Urbana-Champaign
Pre-print Media Attached
13:30
90m
Talk
A Tale of Two Cities: Software Developers Working from Home During the COVID-19 Pandemic
Journal-First Papers
Denae Ford Microsoft Research, Margaret-Anne Storey University of Victoria, Thomas Zimmermann Microsoft Research, Christian Bird Microsoft Research, Sonia Jaffe Microsoft, Chandra Maddila Microsoft Research, Jenna L. Butler Microsoft Research, Brian Houck Microsoft Research, Nachiappan Nagappan Microsoft Research
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
A Grounded Theory Based Approach to Characterize Software Attack Surfaces
Technical Track
sara moshtari Rochester Institute of Technology, Ahmet Okutan Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
Pre-print Media Attached
13:30
90m
Talk
Out of Sight, Out of Mind? How Vulnerable Dependencies Affect Open-Source Projects
Journal-First Papers
Gede Artha Azriadi Prana Singapore Management University, Abhishek Sharma Veracode, Inc., Lwin Khin Shar Singapore Management University, Darius Foo National University of Singapore, Andrew Santosa Veracode, Inc., Asankhaya Sharma Veracode, Inc., David Lo Singapore Management University
Pre-print Media Attached
13:30
90m
Talk
Towards Property-Based Tests in Natural Language
NIER - New Ideas and Emerging Results
Colin Gordon Drexel University
Pre-print Media Attached
13:30
90m
Talk
How Templated Requirements Specifications Inhibit Creativity in Software Engineering
Journal-First Papers
Rahul Mohanani University of Jyväskylä, Paul Ralph Dalhousie University, Burak Turhan University of Oulu, Vladimir Mandić Faculty of Technical Sciences, University of Novi Sad
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
Using Reinforcement Learning for Load Testing of Video Games
Technical Track
Rosalia Tufano Università della Svizzera Italiana, Simone Scalabrino University of Molise, Luca Pascarella Università della Svizzera italiana (USI), Emad Aghajani Software Institute, USI Università della Svizzera italiana, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
Pre-print Media Attached
13:30
90m
Talk
Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source
Technical Track
Anjiang Wei Stanford University, Yinlin Deng University of Illinois at Urbana-Champaign, Chenyuan Yang Nanjing University, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print Media Attached
13:30
90m
Talk
Trust Enhancement Issues in Program Repair
Technical Track
Yannic Noller National University of Singapore, Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao Beihang University, China, Abhik Roychoudhury National University of Singapore
Pre-print Media Attached
13:30
90m
Talk
An Empirical Study on Release Notes Patterns of Popular Apps in the Google Play Store
Journal-First Papers
Aidan Z.H. Yang Carnegie Mellon University, Safwat Hassan Thompson Rivers University, Ying Zou Queen's University, Kingston, Ontario, Ahmed E. Hassan Queen's University
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
Learning Lenient Parsing & Typing via Indirect Supervision
Journal-First Papers
Toufique Ahmed University of California at Davis, Prem Devanbu Department of Computer Science, University of California, Davis, Vincent J. Hellendoorn Carnegie Mellon University
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
CONFETTI: Amplifying Concolic Guidance for Fuzzers
Technical Track
James Kukucka George Mason University, Luís Pina University of Illinois at Chicago, Paul Ammann George Mason University, USA, Jonathan Bell Northeastern University
Pre-print Media Attached
13:30
90m
Talk
Natural Attack for Pre-trained Models of Code
Technical Track
Zhou Yang Singapore Management University, Jieke SHI Singapore Management University, Junda He Singapore Management University, David Lo Singapore Management University
DOI Pre-print Media Attached
13:30
90m
Talk
A Fine-grained Data Set and Analysis of Tangling in Bug Fixing Commits
Journal-First Papers
Steffen Herbold TU Clausthal, Alexander Trautsch University of Göttingen, Benjamin Ledel TU Clausthal, Alireza Aghamohammadi Sharif University of Technology, Taher Ahmed Ghaleb University of Ottawa, Kuljit Kaur Chahal Guru Nanak Dev University, Tim Bossenmaier Karlsruhe Institute of Technology (KIT), Bhaveet Nagaria Brunel University London, Philip Makedonski University of Goettingen, Matin Nili Ahmadabadi University of Tehran, Kristof Szabados Ericsson Hungary ltd., Helge Spieker Simula Research Laboratory, Norway, Matej Madeja Technical University of Košice, Nathaniel G. Hoy Brunel University London, Valentina Lenarduzzi University of Oulu, Shangwen Wang National University of Defense Technology, Gema Rodríguez-Pérez University of British Columbia (UBC), Ricardo Colomo-Palacios Østfold University College, Roberto Verdecchia Vrije Universiteit Amsterdam, Paramvir Singh The University of Auckland, Yihao Qin , Debasish Chakroborti University of Saskatchewan, Willard Davis IBM, Vijay Walunj University of Missouri-Kansas City, Hongjun Wu National University of Defense Technology, Diego Marcilio USI Università della Svizzera italiana, Omar Alam Trent University, Abdullah Aldaeej Imam Abdulrahman Bin Faisal University, Idan Amit The Hebrew University, Burak Turhan University of Oulu, Simon Eismann University of Würzburg, Anna-Katharina Wickert TU Darmstadt, Germany, Ivano Malavolta Vrije Universiteit Amsterdam, Matúš Sulír Technical University of Košice, Fatemeh Hendijani Fard University of British Columbia, Austin Henley University of Tennessee, Efstratios Kourtzanidis University Of Macedonia, Eray Tüzün Bilkent University, Christoph Treude University of Melbourne, Simin Maleki Shamasbi Indendent Researcher, Ivan Pashchenko University of Trento, Marvin Wyrich University of Stuttgart, James C. Davis Purdue University, USA, Alexander Serebrenik Eindhoven University of Technology, Ella Albrecht University of Goettingen, Ethem Utku Aktas Softtech Inc., Daniel Strüber Chalmers | University of Gothenburg / Radboud University, Johannes Erbel University of Goettingen
Pre-print Media Attached
13:30
90m
Talk
A Family of Experiments on Test-Driven Development
Journal-First Papers
Adrian Santos Parrilla University of Oulu, Sira Vegas Universidad Politecnica de Madrid, Oscar Dieste Universidad Politécnica de Madrid, Fernando Uyaguari ETAPA Telecommunications Company, Ayse Tosun Istanbul Technical University, Davide Fucci Blekinge Institute of Technology, Burak Turhan University of Oulu, Giuseppe Scanniello University of Basilicata, Simone Romano University of Bari, Itir Karac University of Oulu, Marco Kuhrmann Reutlingen University, Vladimir Mandić Faculty of Technical Sciences, University of Novi Sad, Robert Ramač Faculty of Technical Sciences, University of Novi Sad, Dietmar Pfahl University of Tartu, Christian Engblom Ericsson, Jarno Kyykka Ericsson, Kerli Rungi Testlio, Carolina Palomeque ETAPA Telecommunications Company, Jaroslav Spisak PAF, Markku Oivo University of Oulu, Natalia Juristo Universidad Politecnica de Madrid
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
SugarC: Scalable Desugaring of Real-World Preprocessor Usage into Pure C
Technical Track
Zachary Patterson University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Brent Pappas University of Central Florida, Shiyi Wei University of Texas at Dallas, Paul Gazzillo University of Central Florida
Pre-print Media Attached
13:30
90m
Talk
Within-project Defect Prediction of Infrastructure-as-Code Using Product and Process Metrics
Journal-First Papers
Stefano Dalla Palma Tilburg University, Dario Di Nucci University of Salerno, Fabio Palomba University of Salerno, Damian Andrew Tamburri TU/e
Link to publication DOI Authorizer link Pre-print Media Attached
13:30
90m
Poster
Enabling End-Users to Implement Larger Block-Based Programs
Posters
Nico Ritschel The University of British Columbia, Felipe Fronchetti Virginia Commonwealth University, Reid Holmes University of British Columbia, Ronald Garcia University of British Columbia, David C. Shepherd Virginia Commonwealth University
13:30
90m
Talk
FADATest: Fast and Adaptive Performance Regression Testing of Dynamic Binary Translation Systems
Technical Track
Jin Wu Harbin Institute of Technology, Jian Dong Harbin Institute Of Technology, Ruili Fang , Wen Zhang University of Georgia, Wenwen Wang University of Georgia, Decheng Zuo Harbin Institute of Technology
Pre-print Media Attached
13:30
90m
Talk
PUS: A Fast and Highly Efficient Solver for Inclusion-based Pointer AnalysisDistinguished Paper Award
Technical Track
Peiming Liu Texas A&M University, Yanze Li University of British Columbia, Bradley Swain Texas A&M University, Jeff Huang Texas A&M University
Pre-print Media Attached
13:30
90m
Talk
Adaptive Performance Anomaly Detection for Online Service Systems via Pattern Sketching
Technical Track
Zhuangbin Chen Chinese University of Hong Kong, China, Jinyang Liu , Yuxin Su Sun Yat-sen University, Hongyu Zhang University of Newcastle, Xiao Ling Huawei Technologies, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong
Pre-print Media Attached
13:30
90m
Talk
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
Technical Track
Michael Cao University of British Columbia, Khaled Ahmed University of British Columbia (UBC), Julia Rubin University of British Columbia
Pre-print Media Attached
13:30
90m
Short-paper
Efficiently and Precisely Searching for Code Changes with DiffSearch
SRC - ACM Student Research Competition
Luca Di Grazia University of Stuttgart
Link to publication DOI File Attached

Information for Participants
Wed 11 May 2022 12:00 - 13:00 at ICSE room 2-even hours - Software Security 8 Chair(s): Barbara Russo
Info for room ICSE room 2-even hours:

Click here to go to the room on Midspace

Wed 11 May 2022 22:00 - 23:00 at ICSE room 2-even hours - Software Security 6 Chair(s): Travis Breaux
Info for room ICSE room 2-even hours:

Click here to go to the room on Midspace