ICSE 2024
Fri 12 - Sun 21 April 2024 Lisbon, Portugal
Thu 18 Apr 2024 10:30 - 11:00 at Open Space - Posters 3

Small and medium enterprises (SMEs) that build individualized software require lightweight solutions to trace cybersecurity concerns across the codebase. This includes tracking where potentially vulnerable assets are handled in the codebase. The solution that provides this tracking should be fully integrated into the developers’ workflow and should be usable by developers who are not cybersecurity experts. To address this need, we propose Security Annotations, which can be added to any codebase regardless of programming language and allows linking blocks of code, functions, or single statements with assets. In order to use the main functionality of the Security Annotations an asset catalog of sufficient quality is needed. These assets can either be identified upfront or while annotating.

We conducted a preliminary evaluation in which four pairs of developers created an asset catalog for a legacy software system and then annotated the code using Security Annotations. All groups successfully identified assets in a code base largely unknown to them. We also found that the annotation patterns differed between pairs but that there were significant overlaps. The workload of identifying assets and performing annotations was demanding, but feasible.

Thu 18 Apr

Displayed time zone: Lisbon change

10:30 - 11:00
Posters 3Posters at Open Space
10:30
30m
Poster
Unleashing the Power of Clippy in Real-World Rust Projects
Posters
Chunmiao Li National Institute of Informatics, Yijun Yu The Open University, UK, Haitao Wu Huawei Technologies Canada, Luca Carlig Huawei Ireland Research Center, Shijie Nie Fujitsu R&D Center, Lingxiao Jiang Singapore Management University
10:30
30m
Poster
The Impact of a Live Refactoring Environment on Software Development
Posters
Sara Fernandes FEUP, Universidade do Porto, Ademar Aguiar Faculty of Engineering, University of Porto & INESC TEC, André Restivo LIACC, Universidade do Porto, Porto, Portugal
10:30
30m
Poster
Tracking assets in source code with Security Annotations
Posters
Daniel Haak Augsburg Technical University of Applied Sciences, Raphael Mayr Augsburg Technical University of Applied Sciences, Jan-Philipp Steghöfer XITASO GmbH IT & Software Solutions, Alexandra Teynor Augsburg Technical University of Applied Sciences, Phillip Heidegger Augsburg Technical University of Applied Sciences
10:30
30m
Poster
eAIEDF: Extended AI Error Diagnosis Flowchart for Automatically Identifying Misprediction Causes in Production Models
Posters
Keita Sakuma NEC Corporation, Ryuta Matsuno NEC Corporation, Yoshio Kameda NEC Corporation
10:30
30m
Poster
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice
Posters
Rui Ren DAMO Academy, Alibaba Group Hangzhou, China, Jingbang Yang DAMO Academy, Alibaba Group Hangzhou, China, Linxiao Yang DAMO Academy, Alibaba Group Hangzhou, China, Xinyue Gu DAMO Academy, Alibaba Group Hangzhou, China, Liang Sun DAMO Academy, Alibaba Group Hangzhou, China
10:30
30m
Poster
Designing Digital Twins for Enhanced Reusability
Posters
Olga Ratushniak University of Gothenburg, Beatriz Cabrero-Daniel University of Gothenburg
10:30
30m
Poster
MUFIN: Improving Neural Repair Models with Back-Translation
Posters
André Silva KTH Royal Institute of Technology, João F. Ferreira INESC-ID and IST, University of Lisbon, He Ye Carnegie Mellon University, Martin Monperrus KTH Royal Institute of Technology
10:30
30m
Poster
Blocks? Graphs? Why Not Both? Designing and Evaluating a Hybrid Programming Environment for End-users
Posters
Nico Ritschel University of British Columbia, Felipe Fronchetti Virginia Commonwealth University, Reid Holmes University of British Columbia, Ronald Garcia University of British Columbia, David C. Shepherd Louisiana State University
10:30
30m
Poster
Fault Localization on Verification Witnesses
Posters
Dirk Beyer LMU Munich, Matthias Kettl LMU Munich, Thomas Lemberger LMU Munich
10:30
30m
Poster
Analyzing the Impact of Context Representation and Scope in Code Infilling
Posters
Jinseok Heo Sungkyunkwan University, Eunseok Lee Sungkyunkwan University
10:30
30m
Poster
Hunting DeFi Vulnerabilities via Context-Sensitive Concolic Verification
Posters
Yepeng Ding University of Tokyo, Arthur Gervais Imperial College London, Roger Wattenhofer ETHZ, Hiroyuki Sato The University of Tokyo
DOI Pre-print Media Attached
10:30
30m
Poster
Exploring the Computational Complexity of SAT Counting and Uniform Sampling with Phase Transitions
Posters
Olivier Zeyen University of Luxembourg, SnT, Maxime Cordy University of Luxembourg, Luxembourg, Gilles Perrouin Fonds de la Recherche Scientifique - FNRS & University of Namur, Mathieu Acher University of Rennes, France / Inria, France / CNRS, France / IRISA, France
10:30
30m
Poster
GRAIL: Checking Transaction Isolation Violations with Graph Queries
Posters
Stefania Dumbrava ENSIIE & Institut Polytechnique de Paris, Zhao Jin ENSIIE, Burcu Kulahcioglu Ozkan Delft University of Technology, Jingxuan Qiu Delft University of Technology