APSEC 2025
Tue 2 - Fri 5 December 2025 Macao, China

This program is tentative and subject to change.

You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 3 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 09:30
​Opening CeremonyTechnical Track at room-1
09:00
30m
Day opening
Opening Ceremony
Technical Track

09:30 - 10:30
Keynote 1Keynotes at room-1
09:30
60m
Keynote
​Keynote 1: How to Build AI Agent, How to Build Agentic AI, and How to Build Automatically?​​
Keynotes
Yang Liu Nanyang Technological University
10:30 - 11:00
Coffee BreakTechnical Track at room-1
10:30
30m
Coffee break
Coffee Break
Technical Track

12:00 - 14:00
12:00
2h
Lunch
Lunch
Technical Track

14:00 - 15:20
Session 1A: Testing and Mutation (Technical Track)Technical Track at room-1
14:00
20m
Full-paper
AutoRCA: A Graph Sequence-based Automatic Root Cause Analysis Method for Microservice Systems Through Multimodal Data
Technical Track
Ying Zhou Southeast University, Yingying Sheng Southeast University, Bixin Li Southeast University
14:20
20m
Full-paper
CAMUS: Context-Aware Neural Mutation Selection
Technical Track
Mingda Chen Beijing Jiaotong University, Bo Wang Beijing Jiaotong University, Youfang Lin Beijing Jiaotong University, Jie M. Zhang King's College London
14:40
20m
Full-paper
ISA: Test Case Generation based on Improved Simulated Annealing Algorithm
Technical Track
Shunhui Ji Hohai University, Yu Shi Hohai University, Ji Deng Hohai University, Pengcheng Zhang Hohai University
15:00
20m
Full-paper
Trace: Test Repair via Agent-based Context Extraction with LLMs
Technical Track
Jingxiang Tu , Bo Lin National University of Defense Technology, Yihao Qin , Shangwen Wang National University of Defense Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology
14:00 - 15:20
Session 1B: Low-code and Maintenance (Technical Track) Technical Track at room-2
14:00
20m
Full-paper
Enhancing Commit Classification for Software Maintenance with Adversarial Learning
Technical Track
Xinrui Li School of Software Technology, Zhejiang University, Xin Yin Zhejiang University, Chao Ni Zhejiang University
14:20
20m
Full-paper
Reliable Code Generation with Test Case Prioritization and Cognitive Validation
Technical Track
Lingyun Huang Zhejiang University, Xin Yin Zhejiang University, Xinrui Li School of Software Technology, Zhejiang University, Chao Ni Zhejiang University
14:40
20m
Full-paper
SeedOrNot: A Classification-Driven Framework for Efficient Seed Scheduling in Hybrid Fuzzing
Technical Track
Qian Yan National Key Laboratory of Science and Technology on Information System Security, Minhuan Huang National Key Laboratory of Science and Technology on Information System Security, Huayang Cao National Key Laboratory of Science and Technology on Information System Security
15:00
20m
Full-paper
Understanding Commercial Low-code App Bugs
Technical Track
Hadia Syed Shanghai Jiao Tong University, Zhixing He , Ye Tang Shanghai Jiao Tong University, Jiqing Liu Shanghai Jiao Tong University, Shengjie Chen Inspur, Lixin Sun Inspur, Hao Zhong Shanghai Jiao Tong University
14:00 - 15:30
Session 1C: LLM Applications (ERA Track) Early Research Achievements (ERA) at room-3
14:00
15m
Full-paper
An Empirical Analysis of ESLint Information Components and Their Interactions in LLM-based Program Repair
Early Research Achievements (ERA)
Shinhyuck Kang Sungkyunkwan University, Jinseok Heo Sungkyunkwan University, Eunseok Lee Sungkyunkwan University
14:15
15m
Full-paper
Compressing Cell Execution Logs Embedded within Jupyter Notebook Files
Early Research Achievements (ERA)
Tomoki Nakamaru The University of Tokyo
14:30
15m
Full-paper
Developing a Japanese-Localization Code Benchmark for LLMs
Early Research Achievements (ERA)
Haruka Tsuchida Japan Women's University, Miyu Sato Japan Women's University, Yuha Nishigata Japan Women's University, Ito Waka Japan Women's University, Kimio Kuramitsu Japan Women's University
14:45
15m
Full-paper
DTM: Deterministic Approaches for Black-box Test Suite Minimization with Tree-based Similarity
Early Research Achievements (ERA)
Md Siam , Shartaz Sajid Nahid Institute of Information Technology, University of Dhaka, Md Arif Hasan University of Dhaka, Bangladesh, Nurul Ahad Tawhid Institute of Information Technology, University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka
15:00
15m
Full-paper
Enhancing Requirement-to-Code Traceability via Chain-of-Thought Prompting in Large Language Models
Early Research Achievements (ERA)
wang wenqing , Ye Wang Zhejiang Gongshang University, Liping Zhao , Qiao Huang Zhejiang Gongshang University, Bo Jiang Zhejiang Gongshang University
15:15
15m
Full-paper
RAG4Test: Retrieving GUI States for Multilingual Bug Report and Test Case Generation via LLMs
Early Research Achievements (ERA)
Zhiyao Wang The University of Osaka, Xiujing Guo The University of Osaka, Tatsuhiro Tsuchiya Osaka University
14:00 - 15:00
Session 1D: Industrial Practices (SEIP)Software Engineering in Practices (SEIP) at room-4
14:00
15m
Full-paper
A Catalog of Participatory Reuse Challenges, Solutions, and Lessons Learned
Software Engineering in Practices (SEIP)
Xingru Chen , Muhammad Usman Blekinge Institute of Technology, Deepika Badampudi Blekinge Institute of Technology
14:15
15m
Full-paper
Constructing and Evaluating Domain-Specific Synthetic QA Datasets for Airborne Software Engineering: An LLM-Based Framework in Practice
Software Engineering in Practices (SEIP)
Xiyue Ruan Avicas Generic Technology Co., Ltd, Zheng Xu Avicas Generic Technology Co., Ltd, Xu yifan , Yunduo Wang School of Software, Beihang University, Lindong Wang Shanghai Jiao Tong University, Minzhe Li Shanghai Jiao Tong University, Ning Ge School of Software, Beihang University
14:30
15m
Full-paper
It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical Perspective
Software Engineering in Practices (SEIP)
Yuqian Wang Tianjin University, Xiaohong Li Tianjin University, Ruitao Feng Southern Cross University, Yao Zhang Tianjin University, Yuekang Li UNSW
14:45
15m
Full-paper
Virtualization-based Penetration Testing Study for Detecting Accessibility Abuse Vulnerabilities in Banking Apps in East and Southeast Asia
Software Engineering in Practices (SEIP)
Wei Minn Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Vikas K. Malviya Singapore Management University, Benjamin Adolphi Promon, Yan Naing Tun Singapore Management University, Henning Benzon Treichl Promon, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University, David Lo Singapore Management University
15:30 - 16:00
Coffee BreakTechnical Track at room-1
15:30
30m
Coffee break
Coffee Break
Technical Track

16:00 - 17:20
Session 2A: Program Analysis (Technical Track)Technical Track at room-1
16:00
20m
Full-paper
Systematic Mapping Study on Risks and Vulnerabilities in Software Containers
Technical Track
Maha Sroor University of Jyväskylä, Teerath Das University of Jyväskylä, Rahul Mohanani University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla
16:20
20m
Full-paper
A Hierarchical Hybrid-Intelligence Architecture with Consensus, Debate, and Reflection for High-Fidelity NL-to-PPTL Conversion
Technical Track
Tianchi Zhang East China Normal University, Jinhui Lyu , Yong Cai East China Normal University
16:40
20m
Full-paper
MAAP: A Self-Evolving Multi-Agent Automated Vulnerability Repair Framework for Python
Technical Track
Junfan Chen Hainan University, Zhiyuan Fu Hainan University, Ting Yang Xidian University, Ruidong Li Kanazawa University, Hongyu Sun Hainan University, Yuqing Zhang University of Chinese Academy of Sciences, Hainan University
17:00
20m
Full-paper
An Empirical Study of Reinforcement Learning-based Class Integration Test Order Generation
Technical Track
Jiayi Wang Shenzhen Technology University, Shuxiang Zheng Shenzhen Technology University, Miao Zhang Shenzhen Technology University, Yan Xiao Sun Yat-sen University, Peihong Chen Shenzhen Technology University, Xiaoxing Yang Shenzhen Technology University
16:00 - 17:20
Session 2B: Intelligent Systems (Technical Track)Technical Track at room-2
16:00
20m
Full-paper
Human Ants are Beneficial for Team Performance
Technical Track
Iflaah Salman Lappeenranta-Lahti University of Technology (LUT), Alvaro Francisco Gil Universidad Politécnica de Madrid, Juan Garbajosa Technical University of Madrid, Peter Gloor Massachusetts Institute of Technology SDM
16:20
20m
Full-paper
IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case Generation
Technical Track
Peng Wang Hohai University, Shunhui Ji Hohai University, Yikun Guo Hohai University, Pengcheng Zhang Hohai University
16:40
20m
Full-paper
MTL-CR: A Multitask Learning Approach for Code Representation
Technical Track
Dongxu Yu , Feiqiao Mao , Xingyang Du Shenzhen University, Yifan Bai Shenzhen University
17:00
20m
Full-paper
Testing Deep Learning Libraries with Semantic Equivalent API Patterns
Technical Track
Yan Song Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Haoyu Peng Wuhan University, Xiaoyuan Xie Wuhan University
16:00 - 17:30
Session 2C: Testing and Defense (ERA Track) Early Research Achievements (ERA) at room-3
16:00
15m
Full-paper
Explainable Software Engineering: From State of the Practice to State of the Art
Early Research Achievements (ERA)
Zheng Li Queen's University Belfast, UK, Maria Angela Ferrario Queen's University Belfast, Ben Crossey Queen's University Belfast, Austen Rainer Queen's University Belfast
16:15
15m
Full-paper
Function-level Optimization Automatic Tuner for Numerical Programs
Early Research Achievements (ERA)
Xinni Liu National University of Defense Technology, College of Computer Science and Technology, Xinpeng Li National University of Defense Technology, College of Computer Science and Technology, Guangping Yu National University of Defense Technology, College of Computer Science and Technology, Hengbiao Yu , Xin Yi National University of Defense Technology, Chun Huang National University of Defense Technology
16:30
15m
Full-paper
How Far Have LLMs Come Toward Automated SATD Taxonomy Construction?
Early Research Achievements (ERA)
Sota Nakashima Kyushu University, Yuta Ishimoto Kyushu University, Masanari Kondo Kyushu University, Tao Xiao Kyushu University, Yasutaka Kamei Kyushu University
16:45
15m
Full-paper
MAJD: Intent-Aware Multi-Agent Framework for Jailbreak Defense
Early Research Achievements (ERA)
Jigang Xie China Unicom Western Innovation Institute, Zhengfan Wang Xi'an Jiaotong University, Junchao He China Unicom Western Innovation Institute, Wenjing Jiao Xi'an Jiaotong University, Pengfei Dang China Unicom Western Innovation Institute, Yadong Zhou Lanzhou Jiaotong University, Wei Zhang China Unicom Western Innovation Institute, Ming Fan Xi'an Jiaotong University
17:00
15m
Full-paper
Resilient Auto-Scaling of Microservice Architectures with Efficient Resource Management
Early Research Achievements (ERA)
Hussain Ahmad University of Adelaide, Christoph Treude Singapore Management University, Markus Wagner Monash University, Australia, Claudia Szabo The University of Adelaide
17:15
15m
Full-paper
Towards Function-Level Correctness Assessment of System Software with LLMs: A Case Study
Early Research Achievements (ERA)
Zhong Ming Self, Xin Sun School of Electronic Information Engineering, China West Normal University
16:00 - 16:45
Session 2D: Industrial Practices (SEIP)Software Engineering in Practices (SEIP) at room-4
16:00
15m
Full-paper
Towards Data-Driven Real-Time Performance Monitoring of Platform Ecosystems
Software Engineering in Practices (SEIP)
Hegazy Shady Siemens Technology, Muhammad Ammar Siemens Technology, Christoph Elsner Siemens Technology, Jan Bosch Chalmers University of Technology, Helena Holmstr√∂m Olsson Malmö University
16:15
15m
Full-paper
LogExpertSolver: A Multi-Agent Framework for Domain-Specialized Log Parsing
Software Engineering in Practices (SEIP)
Chenxi Mao Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Dan Li Sun Yat-sen University
16:30
15m
Full-paper
Pipelined Zero-Copy Architecture in Edge Stream Processing
Software Engineering in Practices (SEIP)
Yu Su Southeast University, Hui Xue Southeast University, Junyi Zhang The 54th Research Institute of CETC

Thu 4 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 10:00
Keynote 3Keynotes at room-1
09:00
60m
Keynote
Keynote 3: Software Supply Chain Security of Web3​
Keynotes
Martin Monperrus KTH Royal Institute of Technology
10:00 - 10:30
Coffee BreakTechnical Track at room-1
10:00
30m
Coffee break
Coffee Break
Technical Track

10:30 - 12:10
Session 3A: Concurrency & Formal Methods (Technical Track)Technical Track at room-1
10:30
20m
Full-paper
BDafny: A Formal Execution and Verification Framework of the BPMN 2.0 in Dafny
Technical Track
Ziqing Su East China Normal University, Sini Chen , Ran Li East China Normal University, Huibiao Zhu , Jiapeng Wang East China Normal University
10:50
20m
Full-paper
MicroRacer: Detecting Concurrency Bugs for Cloud Service Systems
Technical Track
Zhiling Deng School of Software Engineering, Sun Yat-sen University, Zhuangbin Chen Sun Yat-sen University, Juepeng Wang School of Software Engineering, Sun Yat-sen University
11:10
20m
Full-paper
MUATC: Multi-Agent Utilization to Augment Test Coverage
Technical Track
Tiecheng Ma College of Computer Science and Technology, National University of Defense Technology, Sirui Liu , Jiaxin Liu National University of Defense Technology, Yating Zhang National University of Defense Technology, Wei Dong National University of Defense Technology
11:30
20m
Full-paper
PyReach: A Multi-Agent Framework for Vulnerability Reachability Analysis in Python
Technical Track
Yueqin Wang Institute of Software Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Tianyue Luo , Xu Wang Institute of Software, Chinese Academy of Sciences
11:50
20m
Full-paper
Recovering Variable Names in The Decompiled Code Based on Multi-Task Learning
Technical Track
Jiayi Li Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Jian He Shanghai Aerospace Electronic Technology Institute, Jingjing Gu Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics
10:30 - 11:50
Session 3B: Smart Contracts & Security (Technical Track)Technical Track at room-2
10:30
20m
Full-paper
BEGA:A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive Learning
Technical Track
Zhenglin Li Northeastern University, Dongqi Wang Northeastern University, Shuyue Zhang Northeastern University, Ruiguo Hu , Dongming Chen Northeastern University
10:50
20m
Full-paper
Conanj: Confidential Data Analysis for Confidential Computing of Java Programs
Technical Track
Xinyuan Miao Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Ziyi Lin Alibaba Group
11:10
20m
Full-paper
Empirical assessment of the perception of graphical threat model acceptability
Technical Track
11:30
20m
Full-paper
Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head Attention
Technical Track
Ruoxin Bai , Meng Wang Hebei university, Wanqing Liu Hebei Key Laboratory of High Trusted Information System, Hebei University, Liang Wang Hebei University
10:30 - 12:00
Session 3C: AI and Testing (ERA Track) Early Research Achievements (ERA) at room-3
10:30
15m
Full-paper
Feature-based Transfer Learning in Cross-Project Defect Prediction: A Systematic Review
Early Research Achievements (ERA)
Wang Yunpeng , Dongcheng Li California State Polytechnic University, Man Zhao China University of Geosciences(Wuhan), W. Eric Wong University of Texas at Dallas
10:45
15m
Full-paper
KG-Code: A Knowledge Graph Guided Pre-Training Approach for Code Representation
Early Research Achievements (ERA)
hanyu zhang Waseda University, Tomoji Kishi Waseda University
11:00
15m
Full-paper
MSWT: Multi-Scale Wavelet Transformer for Dynamic Feature-Based Student Program Error Identification
Early Research Achievements (ERA)
YU LINGZHONG , Qing Zhou College of Computer, Chongqing University, Subo Zhao College of Computer, Chongqing University, Siyuan Wang Chongqing University, China
11:15
15m
Full-paper
Multi-Dimensional Metamorphic Testing of Terminology in Machine Translation
Early Research Achievements (ERA)
tanzhifang , Chuanqi Tao Nanjing University of Aeronautics and Astronautics
11:30
15m
Full-paper
Natural Language Explanation in Code Clone Detection using LLM-based Post Hoc Explainer
Early Research Achievements (ERA)
Teeradaj Racharak Tohoku University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Chayanee Junplong Mahidol University, Akara Supratak University College London
11:45
15m
Full-paper
Practices and Challenges of Using DeepSeek in SE: An Empirical Study
Early Research Achievements (ERA)
10:30 - 12:10
AI and ML Tools (Tool Demo Track)Tool Demonstration at room-4
10:30
10m
Full-paper
A Block-Based Educational Tool for Novice Understanding of State Machine Representation
Tool Demonstration
Nichika Takasu , Shinpei Ogata Shinshu University, Erina Makihara , Kozo Okano Shinshu University
10:40
10m
Full-paper
AILinkPreviewer: Enhancing Code Reviews with LLM-Powered Link Previews
Tool Demonstration
Panya Trakoolgerntong , Tao Xiao Kyushu University, Masanari Kondo Kyushu University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Morakot Choetkiertikul Mahidol University, Thailand, Pattaraporn Sangaroonsilp Mahidol University, Yasutaka Kamei Kyushu University
10:50
10m
Full-paper
BiFuzz: A Two-Stage Fuzzing Tool for Open-World Video Games
Tool Demonstration
11:00
10m
Full-paper
GALENE: A Toolkit for Encapsulating Software Engineering Practices in Marine Science AI Applications
Tool Demonstration
Shijia Li , Gaowei Zhang Beijing University of Posts and Telecommunications, Yi Wang Beijing University of Posts and Telecommunications
11:10
10m
Full-paper
Multi-view Leaderboard: Towards Evaluating the Code Intelligence of LLMs From Multiple Views
Tool Demonstration
Mengyuan Liu , Zexun Zhan , Cuiyun Gao Harbin Institute of Technology, Shenzhen, Yujia Chen Harbin Institute of Technology, Shenzhen, Guoai Xu Harbin Institute of Technology, Shenzhen, Chun Yong Chong School of Information Technology, Monash University Malaysia, Shan Gao Hokkaido University, Xin Xia Zhejiang University
11:20
10m
Full-paper
OrchestML: Continuous Integration Tool for Automated Machine Learning Service Compositions
Tool Demonstration
Arogya Kharel , Xiangchi Song Korea Advanced Institute of Science and Technology (KAIST), In-Young Ko Korea Advanced Institute of Science and Technology
11:30
10m
Full-paper
PATCHOULI: Fine-grained Security Patch Detection Engine
Tool Demonstration
Binchang Li , Qingyuan Li , Cuiyun Gao Harbin Institute of Technology, Shenzhen, Qing Liao Harbin Institute of Technology, LiQingyuan
11:40
10m
Full-paper
PromptOps: Automated Tool for Testing Trustworthiness of LLMs
Tool Demonstration
11:50
10m
Full-paper
SQLWizard: A Tool for Robust Text-to-SQL via Intelligent Selection and Fine-Grained Refinement
Tool Demonstration
Keyu Liang , Chao Xiang , Zhifan Ye Zhejiang University, Zhongxin Liu Zhejiang University, Haoye Wang Hangzhou City University, Hao Guo , Youju Chen
12:00
10m
Full-paper
XRepair - Unifying Retrieval, Repair, and Evaluation for Explainable LLM-Based Vulnerability Fixes
Tool Demonstration
Alfred Asare Amoah , Yan Liu Concordia University
12:30 - 14:00
12:30
90m
Lunch
Lunch
Technical Track

14:00 - 15:20
Session 4A: Defect Prediction & Repair (Technical Track)Technical Track at room-1
14:00
20m
Full-paper
caSPESC2Vyper: Conformant and Automatic Generation from DeFi SPESC Legal Contract to Vyper Smart Contract
Technical Track
Yue Yu South-Central Minzu University, Jiahui Wang South-Central Minzu University, Bo Meng South-Central Minzu University, Dejun Wang South-Central Minzu University
14:20
20m
Full-paper
FixConsult: Leveraging External Defect Knowledge Driven Natural Language Suggestions Generation for Software Vulnerability Repair
Technical Track
Gang Hu School of Information Science & Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Xiaoshu Sun School of Information Science&Engineering, Yunnan University, Min Peng
14:40
20m
Full-paper
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks against Binary Code Similarity Detection
Technical Track
Ran Wei Key Laboratory of Cyberspace Security, Hui Shu , Fei Kang Key Laboratory of Cyberspace Security, Ministry of Education Zhengzhou China, Yuyao Huang Key Laboratory of Cyberspace Security, Ministry of Education Zhengzhou China
15:00
20m
Full-paper
Software Defect Prediction Based on Temporal Hypergraph Neural Network
Technical Track
Peng He Hubei University, Shuai Hu Hubei university, Ju Ma Wuhan university, Haoqing Yang Hubei university, Yifan Wang Hubei university
14:00 - 15:20
Session 4B: Protocol and Testing (Technical Track) Technical Track at room-2
14:00
20m
Full-paper
A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications
Technical Track
Shidong Pan Columbia University & New York University, Yikai Ge Washington University in St. Louis, xiaoyu sun The Australian National University
14:20
20m
Full-paper
Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep Models
Technical Track
Qingyuan Sun , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology
14:40
20m
Full-paper
Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring Systems
Technical Track
BaiLing Song Wuhan University of Technology, Lanhao Qin Huazhong University of Science and Technology, Wenhua Hu , Jianwen Xiang , Rui Hao Wuhan University of Technology
15:00
20m
Full-paper
Seed-Adapted Cross-State Protocol Fuzzing
Technical Track
DingchengLi , Shihao Zhu Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences
14:00 - 15:30
Session 4C: Requirements and Code (ERA Track) Early Research Achievements (ERA) at room-3
14:00
15m
Full-paper
A Software Architecture Resilience Assessment Method via Dynamic Bayesian Networks
Early Research Achievements (ERA)
Hao Chen Southeast University, Bixin Li Southeast University, Chunguang Zhang Southeast University, Zixuan Liu Southeast University
14:15
15m
Full-paper
Automating Requirements Modelling with LLMs: An Iterative Contrastive Optimisation Approach
Early Research Achievements (ERA)
Chenxi Lv , Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University
14:30
15m
Full-paper
BlockAlign: Fair Performance Testing for Blockchains based on Configuration Alignment
Early Research Achievements (ERA)
Jing shi , Chenglin Xie Peking University, Jianbo Gao Peking University, Peilun Li Shanghai Tree-Graph Blockchain Research Institute, Guoli Yang Advanced Institute of Big Data, Xiaoying Bai Advanced Institute of Big Data
14:45
15m
Full-paper
QEC-LLM: Training Query-focused Extractive Compression Model with LLM-guiding for Open Domain QA
Early Research Achievements (ERA)
Sijia Wang North China University of Technology, Jy Duan , Xin Li , Haoguang Wen , Yizhuo Zhang Hebei University of Engineering, Chunming Liu , Zibo Yi
15:00
15m
Full-paper
Cross-Project Defect Prediction Based on Feature Fusion and Local Domain Adaptation
Early Research Achievements (ERA)
Xianglu Zhou , Xiaoyan Zhu School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China, Yu Wang , Jiayin Wang Xi'an Jiaotong University, Xin Lai School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China
15:15
15m
Full-paper
Towards Engineering Multi-Agent LLMs: A Protocol-Driven Approach
Early Research Achievements (ERA)
Zhenyu Mao City University of Hong Kong, Jacky Keung City University of Hong Kong, Fengji Zhang , Shuo Liu City University of Hong Kong, Yifei Wang City University of Hong Kong, Jialong Li Waseda University, Japan
15:30 - 16:00
Coffee BreakTechnical Track at room-1
15:30
30m
Coffee break
Coffee Break
Technical Track

16:00 - 17:20
Session 5A: Precision & Code Quality (Technical Track)Technical Track at room-1
16:00
20m
Full-paper
GATUNER:Genetic Algorithm Applied to Floating-Point Precision Tuning
Technical Track
zjn_hpc , Jinchen Xu Information Engineering University, Hongru Yang Hunan University, Changsha, China, Tao Zhang Information Engineering University, Shuai Wang Information Engineering University, Bei Zhou Information Engineering University
16:20
20m
Full-paper
Multi-Stage Generation of Rust Unit Tests with LLMs
Technical Track
Yongqian Chen Zhejiang University, Junwei Zhang Zhejiang University, Xing Hu Zhejiang University, Xin Xia Zhejiang University
16:40
20m
Full-paper
What You See Is Not Always What You Get: Evaluating GPT's Comprehension of Source Code
Technical Track
Jiawen wen , Bangshuo Zhu The University of Sydney, Huaming Chen The University of Sydney
17:00
20m
Full-paper
Where Is Self-admitted Code Generated by Large Language Models on GitHub?
Technical Track
Xiao Yu Zhejiang University, Lei Liu Xi’an Jiaotong University, Xing Hu Zhejiang University, Jin Liu Wuhan University, Xin Xia Zhejiang University
16:00 - 17:20
Session 5B: Fairness and Analysis (Technical Track) Technical Track at room-2
16:00
20m
Full-paper
An empirical comparison of data transformation techniques for clustering-based unsupervised software defect prediction
Technical Track
Zhengxiang Chen Shaanxi Normal University, Zhiqiang Li , Hongyu Zhang Chongqing University, Jie Ren Shaanxi Normal University, Feng Tian Shaanxi Normal University
16:20
20m
Full-paper
Cobweb: Enhanced Generation Diversity for Black-box Fairness Testing
Technical Track
Yingqian Guo , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology
16:40
20m
Full-paper
Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source Projects
Technical Track
Gengwu Zhao , Lu Xiao Stevens Institute of Technology, Hanbin Qin Stevens Institute of Technology, Eman Abdullah AlOmar Stevens Institute of Technology, USA, Sunny Wong Envestnet
17:00
20m
Full-paper
TraceWalker: Synthesizing Interactive Debugging Progresses via Data- and Control-flow Exploration
Technical Track
Yunrui Pei Shanghai Jiao Tong University, Yuk Kwan Wong Hong Kong University of Science and Technology, Chenyang Zhang Shanghai Jiao Tong University, Hongshu Wang National University of Singapore, Wenjie Zhang National University of Singapore, Yun Lin Shanghai Jiao Tong University
16:00 - 17:20
Session 5C: Code Summarization (ERA Track) Early Research Achievements (ERA) at room-3
16:00
20m
Full-paper
CSMS: Boosting Class Code Summarization via Transformer Refinement and Method Summary Fusion
Early Research Achievements (ERA)
Feiqiao Mao , Xingyang Du Shenzhen University, Shaocheng Feng Shenzhen University, Jiafeng Guo Shenzhen University, Yifan Bai Shenzhen University
16:20
20m
Full-paper
Retrieval-Augmented Code Generation of Low-Resource Programming Languages
Early Research Achievements (ERA)
Jianbo Lin Nanjing University, Yuan Zhang Nanjing University, Chuanyi Li Nanjing University, Wentao Zou , Jidong Ge Nanjing University, Bin Luo Nanjing University
16:40
20m
Full-paper
TriGraSum: A Tri-level Graph-based Architecture for Source Code Summarization
Early Research Achievements (ERA)
Ruiguo Hu , Dongqi Wang Northeastern University, Mingzhao Xie Software College, Northeastern University, Zhenglin Li Northeastern University, Dongming Chen Northeastern University
17:00
20m
Full-paper
Unified Modelling and Consistency Verification of UML Multi-View Models Using Alloy
Early Research Achievements (ERA)
Yihui Guo Southwest University, Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University
18:00 - 21:00
18:00
3h
Dinner
Banquet
Technical Track

Fri 5 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 10:20
Session 6A: Requirements and Testing (Technical Track) Technical Track at room-1
09:00
20m
Full-paper
Breaking the Curse of High-Dimensionality: A Transformer-Based Approach to Software Configuration Performance Prediction
Technical Track
ZhengyuePan , Mingjie Tu Hangzhou Dianzi University, Shijie Li China Southern Power Grid Company Limited, Dandan Wang Institute of Software, Chinese Academy of Sciences, Jie Chen Hangzhou Dianzi University
09:20
20m
Full-paper
ChatNRC: A Non-functional Requirement Classification Framework Based on a Generative and Discriminative Mechanism
Technical Track
Yuman Qin School of Computer Science, Wuhan University, Wuhan, Hubei 430072, China., Rong Peng School of Computer Science, Wuhan University, Wuhan, Hubei 430072, China.
09:40
20m
Full-paper
Dialogue Framework for Bug Issue Types Classification in Deep Learning-oriented Projects Based on Large Language Model
Technical Track
Yu Zhao , Zixuan Zeng , Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, Lina Gong Nanjing University of Aeronautics and Astronautic
10:00
20m
Full-paper
Dynamic Variance Reduction-Based Reusable Test Case Generation for Image Classification
Technical Track
Changrong Huang Hohai University, Shunhui Ji Hohai University, Yu Shi Hohai University, Pengcheng Zhang Hohai University
09:00 - 10:30
Session 6B: Log and Analysis (Technical Track) Technical Track at room-2
09:00
22m
Full-paper
Exploring Developer Departure in Open-Source Software Projects: Prevalence, Reason Taxonomy, and Influencing Factors
Technical Track
Yangyang Zhao Zhejiang Sci-Tech University, Bingzheng Zhao Zhejiang Sci-Tech University, Zanxiang He Shenzhen Technology University, Liming Nie
09:22
22m
Full-paper
LLMs are All You Need? Improving Fuzz Testing for MOJO with Large Language Models
Technical Track
Linghan Huang , Peizhou Zhao The University of Sydney, Huaming Chen The University of Sydney
09:45
22m
Full-paper
SVPrompt-MR: An LLM-Based Metamorphic Relation Identification Method with Self-Verification Mechanism
Technical Track
Jun Huang University of South China, Meng Li University of South China, Xiao Hua Yang University of South China, Jie Liu University of South China, Shi Yu Yan University of South China
10:07
22m
Full-paper
Understanding Industrial Log Analysis: A Multi-Dataset Evaluation of Parsing and Anomaly Detection
Technical Track
Yicheng Sun City University of Hong Kong, Jacky Keung City University of Hong Kong, Yihan Liao City University of Hong Kong, Hi Kuen Yu City University of Hong Kong
09:00 - 10:20
Session 6C: Security and Architecture (Technical Track) Technical Track at room-3
09:00
20m
Full-paper
A Comparative Study Towards Designing a Hybrid Architecture of Microservices and LLM-based Multi-Agent Systems
Technical Track
Peyman Yazdanian Concordia University, Canada, Yan Liu Concordia University, Zheng Li Queen's University Belfast, UK
09:20
20m
Full-paper
Chain of Command: Context-Aware Android Malware Detection via Permission-to-API Call Chains and Graph Representation Learning
Technical Track
Zhichao Shi , Qiang Han North Minzu University, Zihao Zhang North Minzu University
09:40
20m
Full-paper
Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Technical Track
Yihan Liao City University of Hong Kong, Jacky Keung City University of Hong Kong, Xiaoxue Ma Hong Kong Metropolitan University, Jingyu Zhang City University of Hong Kong, Yicheng Sun City University of Hong Kong
10:00
20m
Full-paper
Towards Lightweight LLM Software Solutions for InsurTech: A Framework for Scalable Question Answering Systems
Technical Track
Hi Kuen Yu City University of Hong Kong, Jacky Keung City University of Hong Kong, Yicheng Sun City University of Hong Kong, Yihan Liao City University of Hong Kong, Richard Suen Shenzhen MSU-BIT University
10:30 - 11:00
Coffee BreakTechnical Track at room-1
10:30
30m
Coffee break
Coffee Break
Technical Track

11:00 - 12:20
Session 7A: LLM Code Generation (Technical Track) Technical Track at room-1
11:00
20m
Full-paper
AgentTCP: A Collaborative Multi-Agent Framework for Change-Aware Test Case Prioritization
Technical Track
Junyu Chen Chongqing University, Xiuhua Li Sichuan International Studies University, Jinping Wang Chonqing University, Huan Xie Chongqing University, Chunyan Liu Chongqing University, Zhenyu Wu , Yan Lei Chongqing University
11:20
20m
Full-paper
Chart2Code-MoLA: Efficient Multi-Modal Code Generation via Adaptive Expert Routing
Technical Track
Yifei Wang City University of Hong Kong, Jacky Keung City University of Hong Kong, Zhenyu Mao City University of Hong Kong, Jingyu Zhang City University of Hong Kong, CAO YUCHEN
11:40
20m
Full-paper
LLM-Based Semantic Modeling and Cooperative Evolutionary Fuzzing for Traffic Violation Scenario Generation
Technical Track
Liu Yangyang , Xinyu Li Hohai University, Yan Xiao Sun Yat-sen University, Miao Zhang Shenzhen Technology University, Pengcheng Zhang Hohai University
12:00
20m
Full-paper
Multi-agent Assisted Automatic Test Generation for Java JSON Libraries
Technical Track
Sinan Wang Southern University of Science and Technology, Zhiyuan Zhong The University of Utah, Shaojin Wen Alibaba Inc, Yepang Liu Southern University of Science and Technology
11:00 - 12:20
Session 7B: WebAssembly & Optimization (Technical Track) Technical Track at room-2
11:00
20m
Full-paper
A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code Search
Technical Track
Gang Hu School of Information Science & Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Fan Su School of Information Science&Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, Fei Yang , Min Peng
11:20
20m
Full-paper
How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption Analysis
Technical Track
Sicheng He , Wanwei Zhan Wuhan University of Technology, Jijun Wang Wuhan University of Technology, Junjie Dai Zhejiang University, Haoxuan Chen Wuhan University of Technology, Cheng Tan Wuhan University of Technology, Fuyang Li Wuhan University of Technology
11:40
20m
Full-paper
Optimizing Type Duplication in WebAssembly Module Splitting
Technical Track
Xifan Xu , Jun Ma Nanjing University, Chun Cao Nanjing University
12:00
20m
Full-paper
Practical Lossless Recompression of JPEG Images Using Transform Domain Prediction
Technical Track
Long Chen Engineering Research Center of Transportation Information and Safety, ERCTIS, MoE of China. School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wenhua Hu , Rui Hao Wuhan University of Technology, Junwei Zhou , Jianwen Xiang
12:30 - 14:00
12:30
90m
Lunch
Lunch
Technical Track

14:00 - 15:20
Session 8A: Testing and Regression (Technical Track)Technical Track at room-1
14:00
20m
Full-paper
A Packing-Insensitive Detection Method for Android Malware Based on Image Representation
Technical Track
Siyuan Ma , Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences
14:20
20m
Full-paper
Enhancing Diffusion-Driven Test Input Generation using Large Language Model
Technical Track
Joonwoo Lee Hanyang University, Seungho Kim Hanyang University, Scott Uk-Jin Lee Hanyang University
14:40
20m
Full-paper
HGTRTracer: Advancing Requirements-Code Traceability with LLM-Augmented Attribution Reasoning and Heterogeneous Graph Transformer
Technical Track
Huan Jin School of Computer Science and Artificial Intelligence, Wuhan Textile University, Yingkai Yuan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Bangchao Wang Wuhan Textile University, Hongyan Wan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Zhiyuan Zou The School of Computer Science and Artificial Intelligence, Wuhan Textile University, Wuhan, China
15:00
20m
Full-paper
SMTPRT:Performance Regression Testing and Localization for SMT Solvers Across Multiple Logics
Technical Track
Ziyang Wang Tianjin University, Xiaohong Li Tianjin University, Lili Quan Tianjin University, Yao Zhang Tianjin University, Ruitao Feng Southern Cross University, Zhiping Zhou
14:00 - 15:20
Session 8B: Requirements Engineering (Technical Track) Technical Track at room-2
14:00
20m
Full-paper
A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements Elicitation
Technical Track
Shengxin Zhao Inner Mongolia Normal University, Chunhui Wang , Zhiguo Liu Inner Mongolia Normal University, Tong Li Beijing University of Technology, Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University
14:20
20m
Full-paper
Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements Documentation
Technical Track
Ben Cheng School of Information Technology, Deakin University, Yi Wang School of Information Technology, Deakin University, Oscar Wu School of Information Technology, Deakin University, Chetan Arora Monash University, Thuong Hoang School of Information Technology, Deakin University, Xiao Liu School of Information Technology, Deakin University
14:40
20m
Full-paper
MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User Stories
Technical Track
Yi Wang Inner Mongolia Normal University, Chunhui Wang , Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University, Tong Li Beijing University of Technology, Zhiguo Liu College of Computer Science and Technology,Inner Mongolia Normal University
15:00
20m
Full-paper
PerProb: Indirectly Evaluating Memorization in Large Language Models
Technical Track
Yihan Liao City University of Hong Kong, Jacky Keung City University of Hong Kong, Xiaoxue Ma Hong Kong Metropolitan University, Jingyu Zhang City University of Hong Kong, Yicheng Sun City University of Hong Kong
15:30 - 16:00
Closing CeremonyTechnical Track at room-1
15:30
30m
Day closing
Closing Ceremony
Technical Track