ICSME 2025
Sun 7 - Fri 12 September 2025 Auckland, New Zealand

This program is tentative and subject to change.

Fri 12 Sep 2025 13:30 - 13:45 at Case Room 2 260-057 - Session 16 - Security 2 Chair(s): Gregorio Robles

Serverless computing, as an emerging cloud com- puting paradigm, has been adopted to develop a wide range of software applications because of its simplicity of infrastructure management. Unfortunately, its characteristics also introduce new types of faults (e.g., faults due to insufficient computing resource allocation) and challenges to serverless computing-based applications (abbreviated as serverless applications). While prior studies have highlighted that serverless developers encounter various challenges, no attempts have been made to understand the faults in serverless applications. These faults may cause catastrophic consequences such as application crash, thereby hindering the further spread of serverless computing. We aim in this paper to understand the symptoms, root causes, and fix patterns of faults in serverless applications. To this end, we conduct an empirical study investigating developers’ issues on GitHub and posts on Stack Overflow (SO). We first identify 546 real-world serverless-related faults from GitHub and SO. Then, we manually analyze and construct taxonomies of the symptoms, root causes, and fix patterns for these faults, respectively. Our study leads to the first taxonomy for symptoms of serverless- related faults, covering 5 categories and 21 subcategories. The findings of our study inform that the Permission Denied error is the most common type (10.81%) of faults. Besides, the Incorrect Code Logic is the main cause (17.95%) behind the faults. Furthermore, we summarize 15 fix patterns that can resolve 73.63% of faults in this study. Based on the results, we provide actionable implications which can potentially facilitate research and assist developers in improving the development of serverless applications. Finally, we implement a knowledge-based Q&A tool named SAFHELPER to help developers in understanding and fixing faults

This program is tentative and subject to change.

Fri 12 Sep

Displayed time zone: Auckland, Wellington change

13:30 - 15:00
13:30
15m
Understanding the Faults in Serverless Computing Based Applications: An Empirical Study
Research Papers Track
Changrong Xie National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Xinjun Mao National University of Defense Technology, Kang Yang National University of Defense Technology, Tanghaoran Zhang National University of Defense Technology
13:45
15m
Security Vulnerabilities in Docker Images: A Cross-Tag Study of Application Dependencies
Research Papers Track
Hamid Mohayeji Nasrabadi Eindhoven University of Technology, Eleni Constantinou University of Cyprus, Alexander Serebrenik Eindhoven University of Technology
14:00
15m
Trust and Verify: Formally Verified and Upgradable Trusted Functions
Research Papers Track
Marcus Birgersson KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden, Musard Balliu KTH Royal Institute of Technology
14:15
10m
LeakageDetector 2.0: Analyzing Data Leakage in Jupyter-Driven Machine Learning PipelinesOnline
Tool Demonstration Track
Owen Truong Stevens Institute of Technology, Terrence Zhang Stevens Institute of Technology, Arnav Marchareddy Stevens Institute of Technology, Ryan Lee Stevens Institute of Technology, Jeffery Busold Stevens Institute of Technology, Michael Socas Stevens Institute of Technology, Eman Abdullah AlOmar Stevens Institute of Technology, USA
14:25
10m
MalLoc: Towards Fine-grained Android Malicious Payload Localization via LLMs
NIER Track
Tiezhu Sun University of Luxembourg, Marco Alecci University of Luxembourg, Aleksandr Pilgun University of Luxembourg, Yewei Song University of Luxembourg, Xunzhu Tang University of Luxembourg, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
Pre-print
14:35
15m
Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds
Industry Track
Jens Dietrich Victoria University of Wellington, Tim White Victoria University of Wellington, Behnaz Hassanshahi Oracle Labs, Australia, Paddy Krishnan Oracle Labs, Australia
14:50
10m
Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs
Registered Reports
Maria Camporese University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
Hide past events