Filter Program
Dates
Rooms
Tracks
Badges
Your Program
This program is tentative and subject to change.
Sun 16 NovDisplayed time zone: Seoul change
Sun 16 Nov
Displayed time zone: Seoul change
08:30 - 10:00 | New Faculty Symposium 1New Faculty Symposium at Grand Hall 3 Chair(s): Michael Pradel CISPA Helmholtz Center for Information Security | ||
08:30 45mTalk | Establishing an Ethos for Your Research Group New Faculty Symposium Shane McIntosh University of Waterloo | ||
09:15 45mTalk | Building Up Research Team, Brick by Brick New Faculty Symposium David Lo Singapore Management University | ||
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering | ||
10:30 - 12:30 | New Faculty Symposium 2New Faculty Symposium at Grand Hall 3 Chair(s): Michael Pradel CISPA Helmholtz Center for Information Security | ||
10:30 45mTalk | Working and Growing with Students New Faculty Symposium Lingming Zhang University of Illinois at Urbana-Champaign | ||
11:15 60mPanel | Panel discussion (morning) New Faculty Symposium David Lo Singapore Management University, Shane McIntosh University of Waterloo, Lingming Zhang University of Illinois at Urbana-Champaign | ||
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Catering | ||
14:00 - 15:30 | |||
14:00 45mTalk | Practical Tips and Pitfalls: Lessons Learned as a New Faculty New Faculty Symposium Zhongxin Liu Zhejiang University | ||
14:45 45mTalk | Finding Balance in Academic Life New Faculty Symposium Jie M. Zhang King's College London | ||
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Catering | ||
16:00 - 18:00 | |||
16:00 45mTalk | Dealing with failure on your path to success New Faculty Symposium Owolabi Legunsen Cornell University | ||
16:45 60mPanel | Panel discussion (afternoon) New Faculty Symposium Jie M. Zhang King's College London, Zhongxin Liu Zhejiang University, Owolabi Legunsen Cornell University | ||
Mon 17 NovDisplayed time zone: Seoul change
Mon 17 Nov
Displayed time zone: Seoul change
09:00 - 09:30 | |||
09:00 30mKeynote | ASE Opening Keynote Shin Yoo KAIST, Marcel Böhme MPI for Security and Privacy, Lingming Zhang University of Illinois at Urbana-Champaign | ||
09:30 - 10:30 | |||
09:30 60mKeynote | We Will Publish No Algorithm Before Its Time Keynote Thomas Reps University of Wisconsin-Madison | ||
10:30 - 11:00 | |||
10:30 30mCoffee break | Break Catering | ||
11:00 - 12:30 | |||
11:00 10mTalk | Defects4C: Benchmarking Large Language Model Repair Capability with C/C++ Bugs Research Papers Jian Wang Nanyang Technological University, Xiaofei Xie Singapore Management University, Qiang Hu Tianjin University, Shangqing Liu Nanjing University, Jiongchi Yu Singapore Management University, Jiaolong Kong Singapore Management University, Yi Li Nanyang Technological University | ||
11:10 10mTalk | MORepair: Teaching LLMs to Repair Code via Multi-Objective Fine-Tuning Journal-First Track Boyang Yang Yanshan University; Beijing JudaoYouda Network Technology, Haoye Tian Aalto University, Jiadong Ren Yanshan University, Hongyu Zhang Chongqing University, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Claire Le Goues Carnegie Mellon University, Shunfu Jin Yanshan University Link to publication DOI Pre-print | ||
11:20 10mTalk | When Fine-Tuning LLMs Meets Data Privacy: An Empirical Study of Federated Learning in LLM-Based Program Repair Journal-First Track Wenqiang LUO City University of Hong Kong, Jacky Keung City University of Hong Kong, Boyang Yang Yanshan University; Beijing JudaoYouda Network Technology, He Ye University College London (UCL), Claire Le Goues Carnegie Mellon University, Tegawendé F. Bissyandé University of Luxembourg, Haoye Tian Aalto University, Xuan-Bach D. Le University of Melbourne | ||
11:30 10mTalk | Test-based Patch Clustering for Automatically-Generated Patches Assessment Journal-First Track Matias Martinez Universitat Politècnica de Catalunya (UPC), Maria Kechagia National and Kapodistrian University of Athens, Anjana Perera Oracle Labs, Australia, Justyna Petke University College London, Federica Sarro University College London, Aldeida Aleti Monash University | ||
11:40 10mTalk | Hierarchical Knowledge Injection for Improving LLM-based Program Repair Research Papers Ramtin Ehsani Drexel University, Esteban Parra Rodriguez Belmont University, Sonia Haiduc Florida State University, Preetha Chatterjee Drexel University, USA | ||
11:50 10mTalk | Characterizing Multi-Hunk Patches: Divergence, Proximity, and LLM Repair Challenges Research Papers Noor Nashid University of British Columbia, Daniel Ding University of British Columbia, Keheliya Gallaba Centre for Software Excellence, Ahmed E. Hassan Queen’s University, Ali Mesbah University of British Columbia | ||
12:00 10mTalk | Reinforcement Learning for Mutation Operator Selection in Automated Program Repair Journal-First Track Carol Hanna University College London, Aymeric Blot University of Rennes, IRISA / INRIA, Justyna Petke University College London | ||
12:10 10mTalk | APRMCTS: Improving LLM-based Automated Program Repair with Iterative Tree Search Research Papers Haichuan Hu Nanjing University of Science and Technology, Congqing He School of Computer Sciences, Universiti Sains Malaysia, Xiaochen Xie Department of Management, Zhejiang University, China, Hao Zhang School of Computer Sciences, Universiti Sains Malaysia, Quanjun Zhang School of Computer Science and Engineering, Nanjing University of Science and Technology | ||
12:20 10mTalk | Seeing is Fixing: Cross-Modal Reasoning with Multimodal LLMs for Visual Software Issue Repair Research Papers Kai Huang Technical University of Munich, Jian Zhang Nanyang Technological University, Xiaofei Xie Singapore Management University, Chunyang Chen TU Munich | ||
11:00 - 12:30 | |||
11:00 10mTalk | The Fault in our Stats Research Papers | ||
11:10 10mTalk | Agents in the Sandbox: End-to-End Crash Bug Reproduction for Minecraft Research Papers Eray Yapağcı Bilkent University, Yavuz Alp Sencer Öztürk Bilkent University, Eray Tüzün Bilkent University | ||
11:20 10mTalk | Finding Bugs in MLIR Compiler Infrastructure via Lowering Space Exploration Research Papers Jingjing Liang East China Normal University, Shan Huang East China Normal University, Ting Su East China Normal University | ||
11:30 10mTalk | Why Do Machine Learning Notebooks Crash? An Empirical Study on Public Python Jupyter Notebooks Journal-First Track Yiran Wang Linköping University, Willem Meijer Linköping University, José Antonio Hernández López Universidad de Murcia, Ulf Nilsson Linköping University, Daniel Varro Linköping University / McGill University | ||
11:40 10mTalk | When AllClose Fails: Round-Off Error Estimation for Deep Learning Programs Research Papers Qi Zhan Zhejiang University, Xing Hu Zhejiang University, Yuanyi Lin Huawei Technologies, Tongtong Xu Huawei, Xin Xia Zhejiang University, Shanping Li Zhejiang University | ||
11:50 10mTalk | LLM-Powered Multi-Agent Collaboration for Intelligent Industrial On-Call Automation Research Papers Ruowei Fu Nankai University, Yang Zhang ByteDance Inc., Zeyu Che Nankai University, Xin Wu ByteDance Inc., Zhenyu Zhong Nankai University, Zhiqiang Ren ByteDance Inc., Shenglin Zhang Nankai University, Feng Wang ByteDance Inc., Yongqian Sun Nankai University, Xiaozhou Liu ByteDance Inc., Kexin Liu Nankai University, Yu Zhang ByteDance Inc. | ||
12:00 10mTalk | SSR: Safeguarding Staking Rewards by Defining and Detecting Logical Defects in DeFi Staking Research Papers Zewei Lin Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Jingwen Zhang School of Software Engineering, Sun Yat sen University, Zexu Wang Sun Yat-sen University, Yuming Feng Peng Cheng Laboratory, Weizhe Zhang Harbin Institute of Technology, Zibin Zheng Sun Yat-sen University | ||
12:10 10mTalk | Finding Bugs in WebAssembly Interface Type Binding Generators Research Papers | ||
12:20 10mTalk | LineBreaker: Finding Token-Inconsistency Bugs using Large Language Models Research Papers Hongbo Chen Indiana University Bloomington, Yifan Zhang San Diego State University, Xing Han The Hong Kong University of Science and Technology, Tianhao Mao Indiana University, Huanyao Rong Indiana University Bloomington, Yuheng Zhang Tsinghua University, Hang Zhang Indiana University, XiaoFeng Wang ACM member, Luyi Xing Indiana University Bloomington/University of Illinois Urbana-Champaign, Xun Chen Samsung Research America | ||
11:00 - 12:30 | |||
11:00 10mTalk | ADPerf: Investigating and Testing Performance in Autonomous Driving Systems Research Papers Tri Minh-Triet Pham Concordia University, Diego Elias Costa Concordia University, Canada, Weiyi Shang University of Waterloo, Jinqiu Yang Concordia University | ||
11:10 10mTalk | VRTestSniffer: Test Smell Detector for Virtual Reality (VR) Software Projects Research Papers Faraz Gurramkonda University of Michigan-Dearborn, Avishak Chakroborty University of Michigan-Dearborn, Bruce Maxim University of Michigan - Dearborn, Mohamed Wiem Mkaouer University of Michigan - Flint, Foyzul Hassan University of Michigan at Dearborn | ||
11:20 10mTalk | A Multi-Modality Evaluation of the Reality Gap in Autonomous Driving Systems Research Papers Stefano Carlo Lambertenghi Technische Universität München, fortiss GmbH, Mirena Flores Valdez Technical University of Munich, Andrea Stocco Technical University of Munich, fortiss Pre-print | ||
11:30 10mTalk | On the Robustness Evaluation of 3D Obstacle Detection Against Specifications in Autonomous Driving Research Papers Tri Minh-Triet Pham Concordia University, Bo Yang Concordia University, Jinqiu Yang Concordia University | ||
11:40 10mTalk | TARGET: Traffic Rule-Based Test Generation for Autonomous Driving via Validated LLM-Guided Knowledge Extraction Journal-First Track Yao Deng Macquarie University, Zhi Tu Purdue University, Jiaohong Yao Macquarie University, Mengshi Zhang TensorBlock, Tianyi Zhang Purdue University, Xi Zheng Macquarie University | ||
11:50 10mTalk | IMUFUZZER: Resilience-based Discovery of Signal Injection Attacks on Robotic Aerial Vehicles Research Papers Sudharssan Mohan University of Texas at Dallas, Kyeongseok Yang Korea University, Zelun Kong The University of Texas at Dallas, Yonghwi Kwon University of Maryland, Junghwan Rhee University of Central Oklahoma, Tyler Summers University of Texas at Dallas, Hongjun Choi DGIST, Heejo Lee Korea University, Chung Hwan Kim University of Texas at Dallas | ||
12:00 10mTalk | Argus: Resilience-Oriented Safety Assurance Framework for End-to-End ADSs Research Papers Dingji Wang Fudan University, You Lu Fudan University, Bihuan Chen Fudan University, Shuo Hao Fudan University, Haowen Jiang Fudan University, China, Yifan Tian Fudan University, Xin Peng Fudan University | ||
12:10 10mResearch paper | VRExplorer: A Model-based Approach for Automated Virtual Reality Scene Testing Research Papers Zhu Zhengyang Sun Yat-sen University, Hong-Ning Dai Hong Kong Baptist University, Hanyang Guo School of Software Engineering, Sun Yat-sen University, Zeqin Liao Sun Yat-sen University, Zibin Zheng Sun Yat-sen University Pre-print | ||
12:20 10mTalk | When Autonomous Vehicle Meets V2X Cooperative Perception: How Far Are We? Research Papers An Guo Nanjing University, Shuoxiao Zhang Nanjing University, Enyi Tang Nanjing University, Xinyu Gao , Haomin Pang Guangzhou University, Haoxiang Tian Nanyang Technological University, Singapore, Yanzhou Mu , Wu Wen Guangzhou University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University Pre-print | ||
11:00 - 12:30 | |||
11:00 12mTalk | AutoFid: Adaptive and Noise-Aware Fidelity Measurement for Quantum Programs via Circuit Graph Analysis Research Papers | ||
11:12 12mTalk | HybridSIMD: A Super C++ SIMD Library with Integrated Auto-tuning Capabilities Research Papers Haolin Pan Institute of Software, Chinese Academy of Sciences;School of Intelligent Science and Technology, HIAS, UCAS, Hangzhou;University of Chinese Academy of Sciences, Xulin Zhou Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mingjie Xing Institute of Software, Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences | ||
11:25 12mTalk | PEACE: Towards Efficient Project-Level Performance Optimization via Hybrid Code Editing Research Papers Xiaoxue Ren Zhejiang University, Jun Wan Zhejiang University, Yun Peng The Chinese University of Hong Kong, Zhongxin Liu Zhejiang University, Ming Liang Ant Group, Dajun Chen Ant Group, Wei Jiang Ant Group, Yong Li Ant Group | ||
11:38 12mTalk | CoTune: Co-evolutionary Configuration Tuning Research Papers Gangda Xiong University of Electronic Science and Technology of China, Tao Chen University of Birmingham Pre-print | ||
11:51 12mTalk | It's Not Easy Being Green: On the Energy Efficiency of Programming Languages Research Papers Nicolas van Kempen University of Massachusetts Amherst, USA, Hyuk-Je Kwon University of Massachusetts Amherst, Dung Nguyen University of Massachusetts Amherst, Emery D. Berger University of Massachusetts Amherst and Amazon Web Services | ||
12:04 12mTalk | When Faster Isn't Greener: The Hidden Costs of LLM-Based Code Optimization Research Papers Tristan Coignion Université de Lille - Inria, Clément Quinton Université de Lille, Romain Rouvoy University Lille 1 and INRIA | ||
12:17 12mTalk | United We Stand: Towards End-to-End Log-based Fault Diagnosis via Interactive Multi-Task Learning Research Papers Minghua He Peking University, Chiming Duan Peking University, Pei Xiao Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Siyu Yu The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Lingzhe Zhang Peking University, China, Weijie Hong Peking university, Jing Han ZTE Corporation, Yifan Wu Peking University, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University | ||
11:00 - 12:40 | |||
11:00 10mTalk | LogMoE: Lightweight Expert Mixture for Cross-System Log Anomaly Detection Research Papers Jiaxing Qi Beihang University, Zhongzhi Luan Beihang University, Shaohan Huang Beihang University, Carol Fung Concordia University, Yuchen Wang Beihang University, Aibin Wang Beihang University, Hongyu Zhang Chongqing University, Hailong Yang Beihang University, China, Depei Qian Beihang University, China | ||
11:10 10mTalk | Improving LLM-based Log Parsing by Learning from Errors in Reasoning Traces Research Papers Wang Jialai National University of Singapore, Juncheng Lu Southeast University, Jie Yang Wuhan University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Zhenkai Liang NUS, Ee-Chien Chang School of Computing, NUS | ||
11:20 10mTalk | LogUpdater: Automated Detection and Repair of Specific Defects in Logging Statements Journal-First Track Renyi Zhong The Chinese University of Hong Kong, Yichen LI ByteDance, Jinxi Kuang The Chinese University of Hong Kong, Wenwei Gu The Chinese University of Hong Kong, Yintong Huo Singapore Management University, Singapore, Michael Lyu The Chinese University of Hong Kong | ||
11:30 10mTalk | LogAction: Consistent Cross-system Anomaly Detection through Logs via Active Domain Adaptation Research Papers Chiming Duan Peking University, Minghua He Peking University, Pei Xiao Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Xin Zhang Peking University, Zhewei Zhong Bytedance, Xiang Luo Bytedance, Yan Niu Bytedance, Lingzhe Zhang Peking University, China, Yifan Wu Peking University, Siyu Yu The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Weijie Hong Peking university, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University | ||
11:40 10mTalk | Diplomatist: What Do Cross-language Dependencies Reflect Software Ecosystem Health? Research Papers Fanyi Meng Shenyang University of Technology, Ying Wang Northeastern University, Chun Yong Chong Monash University Malaysia, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China | ||
11:50 10mTalk | Defects4Log: Benchmarking LLMs for Logging Code Defect Detection and Reasoning Research Papers Xin Wang Changsha University of Science and Technology, Zhenhao Li York University, Zishuo Ding The Hong Kong University of Science and Technology (Guangzhou) | ||
12:00 10mTalk | Which Is Better For Reducing Outdated And Vulnerable Dependencies: Pinning Or Floating? Research Papers Imranur Rahman North Carolina State University, Jill Marley North Carolina State University, William Enck North Carolina State University, Laurie Williams North Carolina State University | ||
12:10 10mTalk | On Automating Configuration Dependency Validation via Retrieval-Augmented Generation Research Papers Sebastian Simon Leipzig University, Alina Mailach Leipzig University, Johannes Dorn Leipzig University, Norbert Siegmund Leipzig University Pre-print | ||
12:20 10mTalk | CollaborLog: Efficient-Generalizable Log Anomaly Detection via Large-Small Model Collaboration in Software Evolution Research Papers Pei Xiao Peking University, Chiming Duan Peking University, Minghua He Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Yifan Wu Peking University, Jing Xu ByteDance, Gege Gao ByteDance, Lingzhe Zhang Peking University, China, Weijie Hong Peking university, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University | ||
12:30 10mTalk | On the Robustness Evaluation of 3D Obstacle Detection Against Specifications in Autonomous Driving Research Papers Tri Minh-Triet Pham Concordia University, Bo Yang Concordia University, Jinqiu Yang Concordia University | ||
11:00 - 12:30 | |||
11:00 10mTalk | TensorGuard: Gradient-Based Model Fingerprinting for LLM Similarity Detection and Family Classification Research Papers Zehao Wu Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
11:10 10mTalk | Root Cause Analysis of RISC-V Build Failures via LLM and MCTS Reasoning Research Papers Weipeng Shuai Institute of Software, Chinese Academy of Sciences, Jie Liu Institute of Software, Chinese Academy of Sciences, Zhirou Ma Institute of Software, Chinese Academy of Sciences, Liangyi Kang Institute of Software, Chinese Academy of Sciences, Zehua Wang Institute of Software, Chinese Academy of Sciences, Shuai Wang Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software at Chinese Academy of Sciences, Hui Li , Wei Wang Institute of Software at Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences | ||
11:20 10mTalk | An Empirical Study of Knowledge Transfer in AI Pair Programming Research Papers Alisa Carla Welter Saarland University, Niklas Schneider Saarland University, Tobias Dick Saarland University, Kallistos Weis Saarland University, Christof Tinnes Saarland University, Marvin Wyrich Saarland University, Sven Apel Saarland University | ||
11:30 10mTalk | Efficient Understanding of Machine Learning Model Mispredictions Research Papers Martin Eberlein Humboldt-Universtität zu Berlin, Jürgen Cito TU Wien, Lars Grunske Humboldt-Universität zu Berlin | ||
11:40 10mTalk | Can Mamba Be Better? An Experimental Evaluation of Mamba in Code Intelligence Research Papers Shuo Liu City University of Hong Kong, Jacky Keung City University of Hong Kong, Zhen Yang Shandong University, Zhenyu Mao City University of Hong Kong, Yicheng Sun City University of Hong Kong | ||
11:50 10mTalk | "My productivity is boosted, but ..." Demystifying Users’ Perception on AI Coding Assistants Research Papers | ||
12:00 10mTalk | HFUZZER: Testing Large Language Models for Package Hallucinations via Phrase-based Fuzzing Research Papers Yukai Zhao , Menghan Wu Zhejiang University, Xing Hu Zhejiang University, Xin Xia Zhejiang University | ||
12:10 10mTalk | Provable Fairness Repair for Deep Neural Networks Research Papers Jianan Ma Hangzhou Dianzi University, China; Zhejiang University, Hangzhou, China, Jingyi Wang Zhejiang University, Qi Xuan Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Zhen Wang Hangzhou Dianzi University, China | ||
12:20 10mTalk | AutoAdapt: On the Application of AutoML for Parameter-Efficient Fine-Tuning of Pre-Trained Code Models Journal-First Track Amal Akli University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Mike Papadakis University of Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg | ||
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Catering | ||
14:00 - 15:30 | |||
14:00 10mTalk | Mokav: Execution-driven Differential Testing with LLMs Journal-First Track Khashayar Etemadi ETH Zurich, Bardia Mohammadi Sharif University of Technology, Zhendong Su ETH Zurich, Martin Monperrus KTH Royal Institute of Technology | ||
14:10 10mTalk | Validity-Preserving Delta Debugging via Generator Trace Reduction Journal-First Track Luyao Ren Peking University, Xing Zhang Peking University, Ziyue Hua Peking University, Yanyan Jiang Nanjing University, Xiao He Bytedance, Yingfei Xiong Peking University, Tao Xie Peking University | ||
14:20 10mTalk | Execution-Aware Program Reduction for WebAssembly via Record and Replay Research Papers Doehyun Baek University of Stuttgart, Daniel Lehmann Google, Germany, Ben L. Titzer Carnegie Mellon University, Sukyoung Ryu KAIST, Michael Pradel CISPA Helmholtz Center for Information Security | ||
14:30 10mTalk | DebCovDiff: Differential Testing of Coverage Measurement Tools on Real-World Projects Research Papers Wentao Zhang University of Illinois Urbana-Champaign, Jinghao Jia University of Illinois Urbana-Champaign, Erkai Yu University of Illinois Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign Media Attached | ||
14:40 10mTalk | DRIFT: Debug-based Trace Inference for Firmware Testing Research Papers Changming Liu Northeastern University, Alejandro Mera Northeastern University, Meng Xu University of Waterloo, Engin Kirda Northeastern University | ||
14:50 10mTalk | Enhancing Differential Testing With LLMs For Testing Deep Learning Libraries Journal-First Track Meiziniu LI The Hong Kong University of Science and Technology, Dongze Li The Hong Kong University of Science and Technology, Jianmeng Liu The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Yongqiang Tian Monash University, Shing-Chi Cheung Hong Kong University of Science and Technology | ||
15:00 10mTalk | Unit Test Update through LLM-Driven Context Collection and Error-Type-Aware Refinement Research Papers Yuanhe Zhang Zhejiang University, Zhiquan Yang Zhejiang University, Shengyi Pan Zhejiang University, Zhongxin Liu Zhejiang University | ||
15:10 10mTalk | Metamorphic Testing for Audio Content Moderation Software Research Papers Wenxuan Wang Hong Kong University of Science and Technology, Yongjiang Wu The Chinese University of Hong Kong, Junyuan Zhang The Chinese University of Hong Kong, Shuqing Li The Chinese University of Hong Kong, Yun Peng The Chinese University of Hong Kong, Wenting Chen City University of Hong Kong, Shuai Wang Hong Kong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong | ||
15:20 10mTalk | Comprehend, Imitate, and then Update: Unleashing the Power of LLMs in Test Suite Evolution Research Papers Tangzhi Xu Nanjing University, Jianhan Liu Nanjing University, Yuan Yao Nanjing University, Cong Li ETH Zurich, Feng Xu Nanjing University, Xiaoxing Ma Nanjing University | ||
14:00 - 15:30 | |||
14:00 10mTalk | Enhancing LLM to Decompile Optimized PTX to Readable CUDA for Tensor Programs Research Papers Xinyu Sun University of Science and Technology of China, Fugen Tang University of Science and Technology of China, Yu Zhang University of Science and Technology of China, Han Shen Kuaishou Technology, Chengru Song Kuaishou Technology, Di Zhang Kuaishou Technology | ||
14:10 10mTalk | Forcrat: Automatic I/O API Translation from C to Rust via Origin and Capability Analysis Research Papers | ||
14:20 10mTalk | Polyglot: An Extensible Framework to Benchmark Code Translation with LLMs Research Papers Marco Vieira University of North Carolina at Charlotte, Priyam Ashish Shah University of North Carolina at Charlotte, Bhavain Shah University of North Carolina at Charlotte, Rrezarta Krasniqi University of North Carolina at Charlotte | ||
14:30 10mTalk | RFCScope: Detecting Logical Ambiguities in Internet Protocol Specifications Research Papers Mrigank Pawagi Indian Institute of Science, Bengaluru, Lize Shao Rice University, USA, Hyeonmin Lee University of Virginia, Yixin Sun University of Virginia, Wenxi Wang University of Virgina | ||
14:40 10mTalk | Vision to Specification: Automating the Transition from Conceptual Features to Functional Requirements Journal-First Track Xiaoli Lian Beihang University, China | ||
14:50 10mTalk | RustAssure: Differential Symbolic Testing for LLM-Transpiled C-to-Rust Code Research Papers | ||
15:00 10mTalk | SPEC2CODE: Mapping Software Specification to Function-Level Code Implementation Research Papers Yuekun Wang Singapore Management University, Lili Quan Tianjin University, Xiaofei Xie Singapore Management University, Junjie Wang Tianjin University, Jianjun Chen Tsinghua University | ||
15:10 10mTalk | RustRepoTrans: Repository-level Context Code Translation Benchmark Targeting Rust Research Papers Guangsheng Ou Sun Yat-sen University, Mingwei Liu Sun Yat-Sen University, Yuxuan Chen , Yanlin Wang Sun Yat-sen University, Xin Peng Fudan University, Zibin Zheng Sun Yat-sen University Pre-print | ||
15:20 10mTalk | DLBENCH: A Comprehensive Benchmark for SQL Translation with Large Language Models Research Papers Li Lin Xiamen University, Hongqiao Chen School of Informatics, Xiamen University, Qinglin Zhu School of Informatics, Xiamen University, Liehang Chen School of Informatics, Xiamen University, Linlong Tang School of Informatics, Xiamen University, Rongxin Wu Xiamen University | ||
14:00 - 15:30 | |||
14:00 10mTalk | ScaleCirc: Scaling the Analysis over Circom Circuits Research Papers Jinan Jiang The Hong Kong Polytechnic University, Haoran Qin The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University | ||
14:10 10mTalk | Improving NLSAT for Nonlinear Real Arithmetic Research Papers Zhonghan Wang Institute of Software, Chinese Academy of Sciences Pre-print | ||
14:20 10mTalk | Bridging Natural Language and Formal Specification - Automated Translation of Software Requirements to LTL via Hierarchical Semantics Decomposition Using LLMs Research Papers Zhi Ma Xidian University, Xin-Cheng Wen Harbin Institute of Technology, Zhexin Su Xidian University, Xiao Liang Yu National University of Singapore, Cong Tian Xidian University, Shengchao Qin Xidian University, Mengfei Yang China Academy of Space Technology | ||
14:30 10mTalk | Diagnosing Performance Differences in Model Checkers via Runtime-Guided Problem Generation Research Papers Yibo Dong National University of Singapore, Yicong Xu East China Normal University, Wenjing Deng East China Normal University, Yu Chen Chuzhou University, Xiaoyu Zhang East China Normal University, Jianwen Li East China Normal University, China, Chengyu Zhang Loughborough University, Geguang Pu East China Normal University, China | ||
14:40 10mTalk | VERT: Polyglot Verified Equivalent Rust Transpilation with Large Language Models Research Papers Aidan Z.H. Yang Carnegie Mellon University, Yoshiki Takashima Yale Law School, Brandon Paulsen Amazon, Joey Dodds Amazon, Daniel Kroening Amazon | ||
14:50 10mTalk | Agentic Specification Generator for Move Programs Research Papers Yu-Fu Fu Georgia Institute of Technology, Meng Xu University of Waterloo, Taesoo Kim Georgia Institute of Technology Pre-print | ||
15:00 10mTalk | How Big is the Automaton? Certified Lower Bounds on the Size of Presburger DFAs Research Papers Nicolas Amat ONERA - The French Aerospace Lab, Pierre Ganty IMDEA Software Institute, Spain, Alessio Mansutti IMDEA Software Institute | ||
15:10 10mTalk | Non-termination Witnesses and their Validation Research Papers Zsófia Ádám Department of Measurement and Information Systems, Budapest University of Technology and Economics, Paulína Ayaziová Masaryk University, Czechia, Levente Bajczi Budapest University of Technology and Economics, Dirk Beyer LMU Munich, Marek Jankola LMU Munich, Marian Lingsch-Rosenfeld LMU Munich, Jan Strejcek Masaryk University | ||
15:20 10mTalk | PAT-Agent: Autoformalization for Model Checking Research Papers Xinyue Zuo National University of Singapore, Yifan Zhang National University of Singapore, Hongshu Wang National University of Singapore, Yufan Cai National University of Singapore, Zhe Hou Griffith University, Jing Sun School of Computer Science, University of Auckland, Jin Song Dong National University of Singapore | ||
14:00 - 15:30 | |||
14:00 10mTalk | Why AI Agents Still Need You: Findings from Developer-Agent Collaborations in the Wild Research Papers Aayush Kumar Microsoft, Yasharth Bajpai Microsoft, Sumit Gulwani Microsoft, Gustavo Soares Microsoft, Emerson Murphy-Hill Microsoft | ||
14:10 10mTalk | The Cost of Downgrading Build Systems: A Case Study of Kubernetes Research Papers Gareema Ranjan University of Waterloo, Mahmoud Alfadel University of Calgary, Gengyi Sun University of Waterloo, Shane McIntosh University of Waterloo Pre-print | ||
14:20 10mTalk | Democratizing the Cryptocurrency Ecosystem by Just-In-Time Transformation of Mining Programs Research Papers Wei Liu Nanjing University, Zhenhua Li Tsinghua University, Feng Qian University of Southern California, Feiyu Jin Tsinghua University, Hao Lin Tsinghua University, Yannan Zheng Ant Group, Bo Xiao Ant Group, Xiaokang Qin Ant Group, Tianyin Xu University of Illinois at Urbana-Champaign | ||
14:30 10mTalk | Advancing Automated Ethical Profiling in SE: a Zero-Shot Evaluation of LLM Reasoning Research Papers Patrizio Migliarini University of L'Aquila, Italy, Mashal Afzal Memon University of L’Aquila, Italy, Marco Autili University of L'Aquila, Italy, Paola Inverardi Gran Sasso Science Institute Pre-print | ||
14:40 10mTalk | The Impact of the COVID-19 Pandemic on Women’s Contribution to Public Code Journal-First Track Annalí Casanueva Ifo Institute, Big Data Junior Research Group, Munich, Germany, Davide Rossi University of Bologna, Théo Zimmermann Télécom Paris, Polytechnic Institute of Paris, Stefano Zacchiroli LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France Link to publication DOI Pre-print | ||
14:50 10mTalk | Understanding Feature Request Practice on GitHub via a Large-Scale Empirical Study Research Papers Jiajun Li Nanjing University of Aeronautics and Astronautics, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Minxue Pan Nanjing University, Yu Zhou Nanjing University of Aeronautics and Astronautics | ||
15:00 10mTalk | Interaction2Code: Benchmarking MLLM-based Interactive Webpage Code Generation from Interactive Prototyping Research Papers Jingyu Xiao The Chinese University of Hong Kong, Yuxuan Wan The Chinese University of Hong Kong, Yintong Huo Singapore Management University, Singapore, Zixin Wang The Chinese University of Hong Kong, Xinyi Xu The Chinese University of Hong Kong, Wenxuan Wang Hong Kong University of Science and Technology, Zhiyao Xu Tsinghua University, Yuhang Wang Southwest University, Michael Lyu The Chinese University of Hong Kong | ||
15:10 10mTalk | Engineering Digital Systems for Humanity: a Research Roadmap Journal-First Track Marco Autili University of L'Aquila, Italy, Martina De Sanctis Gran Sasso Science Institute, Paola Inverardi Gran Sasso Science Institute, Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy | ||
15:20 10mTalk | Multi-dimensional Assessment of CrowdSourced Testing Reports via LLMs Research Papers Yue Wang NanJing University, Yuan Zhao Laboratory of Data Intelligence and Interdisciplinary Innovation, Nanjing University, Shengcheng Yu Technical University of Munich, Zhenyu Chen Nanjing University | ||
14:00 - 15:30 | |||
14:00 10mTalk | LAURA: Enhancing Code Review Generation with Context-Enriched Retrieval-Augmented LLM Research Papers Yuxin Zhang Beijing Institute of Technology, Yuxia Zhang Beijing Institute of Technology, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Yanjie Jiang Peking University, Hui Liu Beijing Institute of Technology | ||
14:10 10mTalk | AlertGuardian: Intelligent Alert Life-Cycle Management for Large-scale Cloud Systems Research Papers Guangba Yu The Chinese University of Hong Kong, Genting Mai Sun Yat-sen University, Rui Wang Tencent, Ruipeng Li Tencent, Pengfei Chen Sun Yat-sen University, Long Pan Tencent, Ruijie Xu Tencent | ||
14:20 10mTalk | SPICE : An Automated SWE-Bench Labeling Pipeline for Issue Clarity, Test Coverage, and Effort Estimation Research Papers Aaditya Bhatia Queen's University, Gustavo Oliva Centre for Software Excellence, Huawei Canada, Gopi Krishnan Rajbahadur Centre for Software Excellence, Huawei, Canada, Haoxiang Zhang Huawei, Yihao Chen Center for Software Excellence, Huawei Canada, Zhilong Chen Center for Software Excellence, Huawei Canada, Arthur Leung Center for Software Excellence, Huawei Canada, Dayi Lin Centre for Software Excellence, Huawei Canada, Boyuan Chen Centre for Software Excellence, Huawei Canada, Ahmed E. Hassan Queen’s University | ||
14:30 10mTalk | Managing the variability of a logistics robotic system Journal-First Track | ||
14:40 10mTalk | Sprint2Vec: A Deep Characterization of Sprints in Iterative Software Development Journal-First Track Morakot Choetkiertikul Mahidol University, Thailand, Peerachai Banyongrakkul Mahidol University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Suppawong Tuarob Mahidol University, Hoa Khanh Dam University of Wollongong, Thanwadee Sunetnanta Mahidol University | ||
14:50 10mTalk | Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes Journal-First Track Kashumi Madampe Monash University, Australia, Rashina Hoda Monash University, John Grundy Monash University | ||
15:00 10mTalk | Rechecking Recheck Requests in Continuous Integration: An Empirical Study of OpenStack Research Papers Yelizaveta Brus University of Waterloo, Rungroj Maipradit University of Waterloo, Earl T. Barr University College London, Shane McIntosh University of Waterloo | ||
15:10 10mTalk | An LLM-based multi-agent framework for agile effort estimation Research Papers Long Bui University of Wollongong, Hoa Khanh Dam University of Wollongong, Rashina Hoda Monash University | ||
15:20 10mTalk | From Characters to Structure: Rethinking Real-Time Collaborative Programming Models Research Papers | ||
14:00 - 15:30 | |||
14:00 10mTalk | QuanBench: Benchmarking Quantum Code Generation with Large Language Models Research Papers | ||
14:10 10mTalk | Token Sugar: Making Source Code Sweeter for LLMs through Token-Efficient Shorthand Research Papers Zhensu Sun Singapore Management University, Chengran Yang Singapore Management University, Singapore, Xiaoning Du Monash University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Li Li Beihang University, David Lo Singapore Management University | ||
14:20 10mTalk | FGIT: Fault-Guided Fine-Tuning for Code Generation Research Papers Lishui Fan Zhejiang University, Zhongxin Liu Zhejiang University, Haoye Wang Hangzhou City University, Lingfeng Bao Zhejiang University, Xin Xia Zhejiang University, Shanping Li Zhejiang University | ||
14:30 10mTalk | Mixture-of-Experts Low-Rank Adaptation for Multilingual Code Summarization Research Papers Tianchen Yu School of Software Engineering, South China University of Technology, Li Yuan School of Software Engineering, South China University of Technology, Guangzhou, China, Hailin Huang South China University of Technology, Jiexin Wang South China University of Technology, Yi Cai School of Software Engineering, South China University of Technology, Guangzhou, China | ||
14:40 10mTalk | EfficientEdit: Accelerating Code Editing via Edit-Oriented Speculative Decoding Research Papers Peiding Wang Beihang university, Li Zhang Beihang University, Fang Liu Beihang University, Yinghao Zhu Beihang University, Wang Xu Tsinghua University, Lin Shi Beihang University, Xiaoli Lian Beihang University, China, Minxiao Li Beihang university, Bo Shen Huawei Cloud Computing Technologies Co., Ltd., Binzhang Fu Huawei Technologies, n.n. Pre-print | ||
14:50 10mTalk | Bias Testing and Mitigation in LLM-based Code Generation Journal-First Track Dong Huang The University of Hong Kong, Jie M. Zhang King's College London, Qingwen Bu Shanghai Jiao Tong University, Xiaofei Xie Singapore Management University, Junjie Chen Tianjin University, Heming Cui University of Hong Kong | ||
15:00 10mTalk | FastCoder: Accelerating Repository-level Code Generation via Efficient Retrieval and Verification Research Papers Qianhui Zhao Beihang University, Li Zhang Beihang University, Fang Liu Beihang University, Xiaoli Lian Beihang University, China, Meng Qiaoyuanhe Beihang University, Ziqian Jiao Beihang University, Zetong Zhou Beihang University, Jia Li , Lin Shi Beihang University Pre-print | ||
15:10 10mTalk | AlignCoder: Aligning Retrieval with Target Intent for Repository-Level Code Completion Research Papers Tianyue Jiang Sun Yat-sen University, Yanli Wang Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Daya Guo , Ensheng Shi Huawei, Yuchi Ma Huawei Cloud Computing Technologies, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University | ||
15:20 10mTalk | Effectiveness of symmetric metamorphic relations on validating the stability of code generation LLM Journal-First Track Chan Pak Yuen Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong, China, Jacky Keung City University of Hong Kong, Zhen Yang Shandong University | ||
15:00 - 18:00 | |||
15:00 3hDemonstration | Towards Context-aware Mobile Privacy Notice: Implementation of A Deployable Contextual Privacy Policies Generator Tool Demonstration Track Haochen Gong Australian National University, Zhen Tao Technical University of Munich, Shidong Pan Columbia University & New York University, Zhenchang Xing CSIRO's Data61, Xiaoyu Sun Australian National University, Australia | ||
15:00 3hDemonstration | Metamorphic Testing of Deep Reinforcement Learning Agents with MDPMORPH Tool Demonstration Track Jiapeng Li Beihang University, Zheng Zheng Beihang University, Yuning Xing University of Auckland, Daixu Ren Beihang University, Steven Cho The University of Auckland, New Zealand, Valerio Terragni University of Auckland | ||
15:00 3hDemonstration | FlowStrider: Low-friction Continuous Threat Modeling Tool Demonstration Track Bernd Gruner German Aerospace Center (DLR), Institute of Data Science, Noah Erthel German Aerospace Center (DLR), Clemens-Alexander Brust German Aerospace Center (DLR) | ||
15:00 3hDemonstration | ReFuzzer: Feedback-Driven Approach to Enhance Validity of LLM-Generated Test Programs Tool Demonstration Track Iti Shree King's College London, Karine Even-Mendoza King’s College London, Tomasz Radzik King's College London | ||
15:00 3hDemonstration | DESIGNATOR: a Toolset for Automated GAN-enhanced Search-based Testing and Retraining of DNNs in Martian Environments Tool Demonstration Track Pre-print | ||
15:00 3hDemonstration | Chrysalis: A Lightweight Framework for Metamorphic Testing in Python Tool Demonstration Track Jai Parera University of California, Los Angeles, Nathan Huey University of California, Los Angeles, Ben Limpanukorn University of California, Los Angeles, Miryung Kim UCLA and Amazon Web Services | ||
15:00 3hDemonstration | AndroFL: Evolutionary-Driven Fault Localization for Android Apps Tool Demonstration Track Vishal Singh Indian Institute of Technology Kanpur, Ravi Shankar Das Indian Institute of Technology Kanpur, Prajwal H G InMobi, Subhajit Roy IIT Kanpur DOI | ||
15:00 3hDemonstration | XRintTest: An Automated Framework for User Interaction Testing in Extended Reality Applications Tool Demonstration Track Ruizhen Gu University of Sheffield, José Miguel Rojas University of Sheffield, Donghwan Shin University of Sheffield Pre-print | ||
15:00 3hDemonstration | Training-Control-as-Code: Towards a declarative solution to control training Tool Demonstration Track Padmanabha V. Seshadri IBM India Research Lab, Harikrishnan Balagopal IBM India Research Lab, Mehant Kammakomati IBM India Research Lab, Ashok Pon Kumar IBM Research - India, Dushyant Behl IBM Research Media Attached | ||
15:00 3hDemonstration | VUSC: An Extensible Research Platform for Java-Based Static Analysis Tool Demonstration Track | ||
15:00 3hDemonstration | BASHIRI: Learning Failure Oracles from Execution Features Tool Demonstration Track Marius Smytzek CISPA Helmholtz Center for Information Security, Martin Eberlein Humboldt-Universtität zu Berlin, Tural Mammadov CISPA Helmholtz Center for Information Security, Lars Grunske Humboldt-Universität zu Berlin, Andreas Zeller CISPA Helmholtz Center for Information Security | ||
15:00 3hDemonstration | FETT: Fault Injection as an Educational and Training Tool in Cybersecurity Tool Demonstration Track Anaé De Baets University of Namur, Guillaume Nguyen University of Namur, Xavier Devroey University of Namur, Fabian Gilson University of Canterbury Pre-print | ||
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Catering | ||
16:00 - 17:10 | |||
16:00 10mTalk | Interaction-Aware Patch Assessment for Multi-Fault Automated Program Repair NIER Track Omar I. Al-Bataineh Gran Sasso Science Institute (GSSI) | ||
16:10 10mTalk | Simulated Interactive Debugging NIER Track Yannic Noller Ruhr University Bochum, Erick Chandra Singapore University of Technology and Design, Srinidhi HC Singapore University of Technology and Design, Kenny Choo Singapore University of Technology and Design, Cyrille Jegourel ISTD, Singapore University of Technology and Design, Oka Kurniawan Singapore University of Technology and Design, Chris Poskitt Singapore Management University Pre-print | ||
16:20 10mTalk | KAIOps: A Platform Solution of End-to-End Multi-Modal AIOps for AI Training at Scale Industry Showcase Zeying Wang Beihang University, Junhong Liu Beihang University, Penghao Zhang Kuaishou Inc., Xiaoyang Sun University of Leeds, Xu Wang Beihang University, Tianyu Wo , Chunming Hu Beihang University, Chengru Song Kuaishou Technology, Jin Ouyang Kuaishou Inc., Renyu Yang | ||
16:30 10mTalk | KAIR: A Statistical and Causal Approach to Pinpointing Stragglers in Distributed Model Training Industry Showcase Yitang Yang Beihang University, Junhong Liu Beihang University, Jiapeng Chen Kuaishou Inc., Xiaoyang Sun University of Leeds, Tianyu Wo , Chunming Hu Beihang University, Chengru Song Kuaishou Technology, Jin Ouyang Kuaishou Inc., Renyu Yang | ||
16:40 10mTalk | BitsAI-Fix: LLM-Driven Approach for Automated Lint Error Resolution in Practice Industry Showcase Yuanpeng Li ByteDance, Qi Long Carnegie Mellon University, Zhiyuan Yao Zhejiang University, Jian Xu ByteDance, Lintao Xie ByteDance, Xu He ByteDance, Lu Geng ByteDance, Xin Han ByteDance, Yueyan Chen ByteDance, Wenbo Duan ByteDance | ||
16:50 10mTalk | TrioXpert: An automated incident management framework for microservice system Industry Showcase Yongqian Sun Nankai University, Yu Luo Nankai University, Xidao Wen BizSeer, Yuan Yuan National University of Defense Technology, China, Xiaohui Nie Computer Network Information Center at Chinese Academy of Sciences, Shenglin Zhang Nankai University, Tong Liu Lenovo (TianJin) Co., Ltd., Xi Luo Lenovo (TianJin) Co., Ltd. | ||
17:00 10mTalk | eARCO: Efficient Automated Root Cause Analysis with Prompt Optimization Industry Showcase Drishti Goel University of Illinois Urbana Champaign, Raghav Magazine Microsoft Research, Supriyo Ghosh Microsoft, Akshay Nambi Microsoft Research, Prathamesh Deshpande Microsoft, Xuchao Zhang Microsoft, Chetan Bansal Microsoft Research, Saravan Rajmohan Microsoft | ||
16:00 - 17:00 | |||
16:00 10mTalk | A Characterization Study of Bugs in LLM Agent Workflow Orchestration Frameworks Industry Showcase Ziluo Xue Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Kai Chen Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
16:10 10mTalk | Debugging the Undebuggable: Why Multi-Fault Programs Break Debugging and Repair Tools NIER Track Omar I. Al-Bataineh Gran Sasso Science Institute (GSSI) | ||
16:20 10mTalk | ErrorPrism: Reconstructing Error Propagation Paths in Cloud Service Systems Industry Showcase Junsong Pu School of Software Engineering, Sun Yat-sen University, Yichen LI ByteDance, Zhuangbin Chen Sun Yat-sen University, Jinyang Liu ByteDance, Zhihan Jiang The Chinese University of Hong Kong, Jianjun Chen Bytedance, Rui Shi Bytedance, Zibin Zheng Sun Yat-sen University, Tieying Zhang ByteDance | ||
16:30 10mTalk | Fault Injection for Simulink-based CPS Models: Insights and Future Directions NIER Track Drishti Yadav University of Luxembourg, Luxembourg, Claudio Mandrioli University of Luxembourg, Ezio Bartocci TU Wien, Domenico Bianculli University of Luxembourg | ||
16:40 10mTalk | How Does ChatGPT Make Assumptions When Creating Erroneous Programs? NIER Track | ||
16:50 10mTalk | Exploring Autonomous Agents: A Closer Look at Why They Fail When Completing Tasks NIER Track Ruofan Lu The Chinese University of Hong Kong, Yichen LI ByteDance, Yintong Huo Singapore Management University, Singapore | ||
16:00 - 17:00 | |||
16:00 10mTalk | Human-In-The-Loop Oracle Learning for Simulation-Based Testing NIER Track Ben-Hau Chia Carnegie Mellon University, Eunsuk Kang Carnegie Mellon University, Christopher Steven Timperley Carnegie Mellon University | ||
16:10 10mTalk | Taming Uncertainty via Automation: Observing, Analyzing, and Optimizing Agentic AI Systems NIER Track | ||
16:20 10mTalk | Out of Distribution Detection in Self-adaptive Robots with AI-powered Digital Twins Industry Showcase Erblin Isaku Simula Research Laboratory, and University of Oslo (UiO), Hassan Sartaj Simula Research Laboratory, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Beatriz Sanguino Norwegian University of Science and Technology, Tongtong Wang Norwegian University of Science and Technology, Guoyuan Li Norwegian University of Science and Technology, Houxiang Zhang Norwegian University of Science and Technology, Thomas Peyrucain PAL Robotics | ||
16:30 10mTalk | Unseen Data Detection using Routing Entropy in Mixture-of-Experts for Autonomous Vehicles NIER Track Sang In Lee Chungnam Naitional University, Donghwan Shin University of Sheffield, Jihun Park Chungnam National University Pre-print | ||
16:40 10mTalk | Evaluating Large Language Models for Time Series Anomaly Detection in Aerospace Software Industry Showcase Yang Liu Beijing Institute of Control Engineering, Yixing Luo Beijing Institute of Control Engineering, Xiaofeng Li Beijing Institute of Control Engineering, Xiaogang Dong Beijing Institute of Control Engineering, Bin Gu Beijing Institute of Control Engineering, Zhi Jin Peking University | ||
16:50 10mTalk | Bridging Research and Practice in Simulation-based Testing of Industrial Robot Navigation Systems Industry Showcase Sajad Khatiri Università della Svizzera italiana and University of Bern, Francisco Eli Vi˜na Barrientos ANYbotics AG, Maximilian Wulf ANYbotics AG, Paolo Tonella USI Lugano, Sebastiano Panichella University of Bern | ||
16:00 - 17:00 | |||
16:00 10mTalk | SGCR: A Specification-Grounded Framework for Trustworthy LLM Code Review Industry Showcase Kai Wang HiThink Research, Bingcheng Mao HiThink Research, Shuai Jia HiThink Research, Yujie Ding HiThink Research, Dongming Han HiThink Research, Tianyi Ma HiThink Research, Bin Cao Zhejiang University of Technology | ||
16:10 10mTalk | What Types of Code Review Comments Do Developers Most Frequently Resolve? Industry Showcase Saul Goldman The University of Melbourne, Hong Yi Lin The University of Melbourne, Jirat Pasuksmit Atlassian, Patanamon Thongtanunam University of Melbourne, Kla Tantithamthavorn Monash University and Atlassian, Zhe Wang Institute of Computing Technology at Chinese Academy of Sciences; Zhongguancun Laboratory, Ruixiong Zhang Atlassian, Ali Behnaz Atlassian, Fan Jiang Atlassian, Michael Siers Atlassian, Ryan Jiang Atlassian, Mike Buller Atlassian, Minwoo Jeong Atlassian, Ming Wu Atlassian | ||
16:20 10mTalk | Vessel: A Taxonomy of Reproducibility Issues for Container Images NIER Track Kevin Pitstick Carnegie Mellon Software Engineering Institute, Alex Derr Carnegie Mellon Software Engineering Institute, Lihan Zhan Carnegie Mellon Software Engineering Institute, Sebastian Echeverria Carnegie Mellon Software Engineering Institute | ||
16:30 10mTalk | From Modules to Marketplaces: A Vision for Composable Capability Sharing Across Organizations NIER Track Wei-Ji Wang National Taiwan University & Chunghwa Telecom Laboratories | ||
16:40 10mTalk | Towards Automated Governance: A DSL for Human-Agent Collaboration in Software Projects NIER Track Adem Ait University of Luxembourg, Gwendal Jouneaux Luxembourg Institute of Science and Technology, Javier Luis Cánovas Izquierdo Universitat Oberta de Catalunya, Jordi Cabot Luxembourg Institute of Science and Technology Pre-print | ||
16:50 10mTalk | iCodeReviewer: Improving Secure Code Review with Mixture of Prompts Industry Showcase | ||
16:00 - 16:50 | |||
16:00 10mTalk | LogPilot: Intent-aware and Scalable Alert Diagnosis for Large-scale Online Service Systems Industry Showcase Zhihan Jiang The Chinese University of Hong Kong, Jinyang Liu ByteDance, Yichen LI ByteDance, Haiyu Huang CUHK, Xiao He Bytedance, Tieying Zhang ByteDance, Jianjun Chen Bytedance, Yi Li Nanyang Technological University, Rui Shi Bytedance, Michael Lyu The Chinese University of Hong Kong | ||
16:10 10mTalk | Walk the Talk: Is Your Log-based Software Reliability Maintenance System Really Reliable? NIER Track Minghua He Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Chiming Duan Peking University, Pei Xiao Peking University, Lingzhe Zhang Peking University, China, Kangjin Wang Alibaba Group, Yifan Wu Peking University, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University | ||
16:20 10mTalk | Automated Proactive Logging Quality Improvement for Large-Scale Codebases Industry Showcase Yichen LI ByteDance, Jinyang Liu ByteDance, Junsong Pu School of Software Engineering, Sun Yat-sen University, Zhihan Jiang The Chinese University of Hong Kong, Zhuangbin Chen Sun Yat-sen University, Xiao He Bytedance, Tieying Zhang ByteDance, Jianjun Chen Bytedance, Yi Li Nanyang Technological University, Rui Shi Bytedance, Michael Lyu The Chinese University of Hong Kong | ||
16:30 10mTalk | LogSage: An LLM-Based Framework for CI/CD Failure Detection and Remediation with Industrial Validation Industry Showcase Juntao Luo ByteDance, Weiyuan Xu East China Normal University, ByteDance, Tao Huang ByteDance, Kaixin Sui ByteDance, Jie Geng ByteDance, Qijun Ma ByteDance, Isami Akasaka ByteDance, Xiaoxue Shi ByteDance, Jing Tang ByteDance, Peng Cai East China Normal University) | ||
16:40 10mTalk | From Technical Excellence to Practical Adoption: Lessons Learned Building an ML-Enhanced Trace Analysis Tool Industry Showcase Kaveh Shahedi Polytechnique Montréal, Matthew Khouzam Ericsson AB, Heng Li Polytechnique Montréal, Maxime Lamothe Polytechnique Montreal, Foutse Khomh Polytechnique Montréal | ||
16:00 - 16:50 | |||
16:00 10mTalk | Data Dependency-Aware Code Generation from Enhanced UML Sequence Diagrams Industry Showcase Wenxin Mao Tencent, Zhitao Wang Tencent, Long Wang Tencent, Sirong Chen Tencent, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Luyang Cao Tencent, Ziming Liu Tencent, Qiming Zhang Tencent, Jun Zhou Tencent, China, Zhi Jin Peking University | ||
16:10 10mTalk | AutoPLC: Generating Vendor-Aware Structured Text for Programmable Logic Controllers Industry Showcase Donghao Yang Beihang University, Aolang Wu Beihang University, Tianyi Zhang BeiHang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Fang Liu Beihang University, Yuming Ren , Jiaji Tian Beihang University, Xiaoyin Che Siemens AG | ||
16:20 10mTalk | Requirements Development and Formalization for Reliable Code Generation: A Multi-Agent Vision NIER Track Xu Lu Xidian University, Weisong Sun Nanyang Technological University, Yiran Zhang , Ming Hu Singapore Management University, Cong Tian Xidian University, Zhi Jin Peking University, Yang Liu Nanyang Technological University | ||
16:30 10mTalk | Measuring LLM Code Generation Stability via Structural Entropy NIER Track Yewei Song University of Luxembourg, Tiezhu Sun University of Luxembourg, Xunzhu Tang University of Luxembourg, Prateek Kumar Rajput University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg | ||
16:40 10mTalk | TreeRanker: Fast and Model-agnostic Ranking System for Code Suggestions in IDEs Industry Showcase Daniele Cipollone Delft University of Technology, Netherlands, Egor Bogomolov JetBrains Research, Arie van Deursen TU Delft, Maliheh Izadi Delft University of Technology | ||
Tue 18 NovDisplayed time zone: Seoul change
Tue 18 Nov
Displayed time zone: Seoul change
09:00 - 09:30 | |||
09:00 30mTalk | Deep Learning Code Fragments for Code Clone Detection MIP Award Martin White Booz Allen Hamilton, Michele Tufano College of William and Mary, Christopher Vendome Miami University, Denys Poshyvanyk William & Mary DOI | ||
09:30 - 10:30 | |||
09:30 60mKeynote | Oracle Parfait- Detecting Application Vulnerabilities at Scale - Past, Present and Future Keynote Cristina Cifuentes Oracle Software Assurance | ||
10:30 - 11:00 | |||
10:30 30mCoffee break | Break Catering | ||
11:00 - 12:30 | |||
11:00 10mTalk | Coverage-Based Harmfulness Testing for LLM Code Transformation Research Papers Honghao Tan Concordia University, Haibo Wang Concordia University, Diany Pressato Concordia University, Yisen Xu Software PErformance, Analysis, and Reliability (SPEAR) lab, Concordia University, Montreal, Canada, Shin Hwei Tan Concordia University | ||
11:10 10mTalk | RealisticCodeBench: Towards More Realistic Evaluation of Large Language Models for Code Generation Research Papers Xiao Yu Zhejiang University, Haoxuan Chen Wuhan University of Technology, Lei Liu Xi’an Jiaotong University, Xing Hu Zhejiang University, Jacky Keung City University of Hong Kong, Xin Xia Zhejiang University | ||
11:20 10mTalk | Code-DiTing: Automatic Evaluation of Code Generation without References or Test Cases Research Papers Guang Yang , Yu Zhou Nanjing University of Aeronautics and Astronautics, Xiang Chen Nantong University, Wei Zheng Northwestern Polytechnical University, Xing Hu Zhejiang University, Xin Zhou Singapore Management University, Singapore, David Lo Singapore Management University, Taolue Chen Birkbeck, University of London Pre-print | ||
11:30 10mTalk | An Agent-based Evaluation Framework for Complex Code Generation Research Papers Xinchen Wang Harbin Institute of Technology, Pengfei Gao ByteDance, Chao Peng ByteDance, Ruida Hu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Shenzhen | ||
11:40 10mTalk | PseudoFix: Refactoring Distorted Structures in Decompiled C Pseudocode Research Papers Gangyang Li University of Science and Technology of China, Xiuwei Shang University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, junqi zhang University of Science and Technology of China, Li Hu , Xu Zhu University of Science and Technology of China, Weiming Zhang University of Science and Technology of China, Nenghai Yu School of Cyber Security, University of Science and Technology of China | ||
11:50 10mTalk | Evaluating and Improving Framework-based Parallel Code Completion with Large Language Models Research Papers Ke Liu , Qinglin Wang Shandong Normal University, Xiang Chen Nantong University, Guang Yang , YiGui Feng National University of Defense Technology, Gencheng Liu National University of Defense Technology, Jie Liu Institute of Software, Chinese Academy of Sciences | ||
12:00 10mTalk | Variational Prefix Tuning for diverse and accurate code summarization using pre-trained language models Journal-First Track Junda Zhao Department of Mechanical and Industrial Engineering, University of Toronto, Yuliang Song Department of Mechanical and Industrial Engineering, University of Toronto, Eldan Cohen Department of Mechanical and Industrial Engineering, University of Toronto | ||
12:10 10mTalk | Effective Code Membership Inference for Code Completion Models via Adversarial Prompts Research Papers Yuan Jiang Harbin Institute of Technology, Zehao Li Harbin Institute of Technology, Shan Huang East China Normal University, Christoph Treude Singapore Management University, Xiaohong Su Harbin Institute of Technology, Tiantian Wang Harbin Institute of Technology | ||
12:20 10mTalk | LongCodeZip: Compress Long Context for Code Language Models Research Papers Yuling Shi Shanghai Jiao Tong University, Yichun Qian Stanford University, Hongyu Zhang Chongqing University, Beijun Shen Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University Pre-print Media Attached | ||
11:00 - 12:30 | |||
11:00 10mTalk | FaultSeeker: LLM-Empowered Framework for Blockchain Transaction Fault Localization Research Papers Kairan Sun Nanyang Technological University, Zhengzi Xu Imperial Global Singapore, Kaixuan Li Nanyang Technological University, Lyuye Zhang Nanyang Technological University, Yuqiang Sun Nanyang Technological University, Liwei Tan MetaTrust Labs, Yang Liu Nanyang Technological University | ||
11:10 10mTalk | FlexFL: Flexible and Effective Fault Localization With Open-Source Large Language Models Journal-First Track Chuyang Xu Zhejiang University, Zhongxin Liu Zhejiang University, Xiaoxue Ren Zhejiang University, Gehao Zhang Ant Group, Ming Liang Ant Group, David Lo Singapore Management University | ||
11:20 10mTalk | LLM-Based Identification of Null Pointer Exception Patches Research Papers Tahir Ullah Beijing Institute of Technology, Waseem Akram Beijing Institute of Technology, Fiza Khaliq Beijing Institute of Technology, Hui Liu Beijing Institute of Technology | ||
11:30 10mTalk | SpectAcle: Fault Localisation of AI-Enabled CPS by Exploiting Sequences of DNN Controller Inferences Journal-First Track Deyun Lyu National Institute of Informatics, Zhenya Zhang Kyushu University, Japan, Paolo Arcaini National Institute of Informatics
, Xiao-Yi Zhang University of Science and Technology Beijing, Fuyuki Ishikawa National Institute of Informatics, Jianjun Zhao Kyushu University | ||
11:40 10mTalk | Sifting Truth from Coincidences: A Two-Stage Positive and Unlabeled Learning Model for Coincidental Correctness Detection Research Papers Chunyan Liu Chongqing University, Huan Xie Chongqing University, Yan Lei Chongqing University, Zhenyu Wu School of Big Data & Software Engineering, Chongqing University, Jinping Wang Chonqing University | ||
11:50 10mTalk | Let the Code Speak: Incorporating Program Dynamic State for Better Method-Level Fault Localization Research Papers Yihao Qin , Shangwen Wang National University of Defense Technology, Bo Lin National University of Defense Technology, Xin Peng , Sheng Ouyang National University of Defense Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology | ||
12:00 10mTalk | Issue Localization via LLM-Driven Iterative Code Graph Searching Research Papers Zhonghao Jiang Zhejiang University, Xiaoxue Ren Zhejiang University, Meng Yan Chongqing University, Wei Jiang Ant Group, Yong Li Ant Group, Zhongxin Liu Zhejiang University | ||
12:10 10mTalk | Hypergraph Neural Network-based Multi-Granular Root Cause Localization for Microservice Systems Research Papers Yaxiao Li Xidian University, Lu Wang Xidian University, Chenxi Zhang Xidian University, Qingshan Li Xidian University, Siming Rong Xidian University, Baiyang Wen Xidian University, Xuyang Li Purdue University, Kun Ma Xidian University, Quanwei Du Xidian University, KeYang Li Xidian University, Lingfeng Pan Xidian University, Xinyue Li Peking University, MingXuan Hui Xidian University | ||
12:20 10mTalk | Explainable Fault Localization for Programming Assignments via LLM-Guided Annotation Research Papers Fang Liu Beihang University, Tianze Wang Beihang University, Li Zhang Beihang University, Zheyu Yang Beihang University, Jing Jiang Beihang University, Zian Sun Beihang University Pre-print | ||
11:00 - 12:30 | |||
11:00 10mTalk | SMTgazer: Learning to Schedule SMT Algorithms via Bayesian Optimization Research Papers Chuan Luo Beihang University, Shaoke Cui Beihang University, Jianping Song Beihang University, Xindi Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China, Wei Wu Central South University; Xiangjiang Laboratory, Chanjuan Liu Dalian University of Technology, Shaowei Cai Institute of Software at Chinese Academy of Sciences, Chunming Hu Beihang University | ||
11:10 10mTalk | Efficient and Verifiable Proof Logging for MaxSAT Solving Research Papers | ||
11:20 10mTalk | Destabilizing Neurons to Generate Challenging Neural Network Verification Benchmarks Research Papers | ||
11:30 10mTalk | RELIA: Accelerating Analysis of Cloud Access Control Policies Research Papers Dan Wang Xi'an Jiaotong University, Peng Zhang Xi'an Jiaotong University, Zhenrong Gu Xi'an Jiaotong University, Weibo Lin Huawei Cloud, Shibiao Jiang Huawei Cloud, Zhu He Huawei Cloud, Xu Du Huawei Cloud, Longfei Chen Huawei Cloud, Jun Li Huawei, Xiaohong Guan Xi'an Jiaotong University | ||
11:40 10mTalk | Evolution-Aware Heuristics for GR(1) Realizability Checking Research Papers Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University, Jan Oliver Ringert Bauhaus-University Weimar | ||
11:50 10mTalk | Programmers’ Visual Attention on Function Call Graphs During Code Summarization Research Papers Samantha McLoughlin Vanderbilt University, Zachary Karas Vanderbilt University, Robert Wallace University of Notre Dame, Aakash Bansal Louisiana State University, Collin McMillan University of Notre Dame, Yu Huang Vanderbilt University | ||
12:00 10mTalk | LLM-Assisted Synthesis of High-Assurance C Programs Research Papers Prasita Mukherjee Purdue University, Minghai Lu Purdue University, Benjamin Delaware Purdue University Pre-print | ||
12:10 10mTalk | Faster Runtime Verification during Testing via Feedback-Guided Selective Monitoring Research Papers Shinhae Kim Cornell University, Saikat Dutta Cornell University, Owolabi Legunsen Cornell University | ||
12:20 10mTalk | Uncovering Discrimination Clusters: Quantifying and Explaining Systematic Fairness Violations Research Papers Ranit Debnath Akash University of Illinois Chicago, Ashish Kumar Pennsylvania State University, Verya Monjezi University of Texas at El Paso, Ashutosh Trivedi University of Colorado Boulder, Gang (Gary) Tan Pennsylvania State University, Saeid Tizpaz-Niari University of Illinois Chicago | ||
11:00 - 12:30 | |||
11:00 10mTalk | Vulnerability-Affected Versions Identification: How Far Are We? Research Papers Xingchu Chen Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Chengwei Liu Nanyang Technological University, Jialun Cao Hong Kong University of Science and Technology, Yang Xiao Chinese Academy of Sciences, Xinyue Cai Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingyi Shi Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, tianqi sun Institute of Information Engineering, Chinese Academy of Sciences, Haiming Chen Institute of Software, Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences | ||
11:10 10mTalk | LOSVER: Line-Level Modifiability Signal-Guided Vulnerability Detection and Classification Research Papers Doha Nam Korea Advanced Institute of Science and Technology, Jongmoon Baik Korea Advanced Institute of Science and Technology | ||
11:20 10mTalk | VERCATION: Precise Vulnerable Open-source Software Version Identification based on Static Analysis and LLM Journal-First Track Yiran Cheng Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Ting Zhang Monash University, Lwin Khin Shar Singapore Management University, Shouguo Yang Zhongguancun Laboratory, Beijing, China, Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, David Lo Singapore Management University, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
11:30 10mTalk | Not Every Patch is an Island: LLM-Enhanced Identification of Multiple Vulnerability Patches Research Papers Yi Song School of Computer Science, Wuhan University, Dongchen Xie School of Cyber Science and Engineering, Wuhan University, Lin Xu School of Cyber Science and Engineering, Wuhan University, He Zhang School of Computer Science, Wuhan University, Chunying Zhou School of Computer Science, Wuhan University, Xiaoyuan Xie Wuhan University | ||
11:40 10mTalk | Vul-R2: A Reasoning LLM for Automated Vulnerability Repair Research Papers Xin-Cheng Wen Harbin Institute of Technology, Zirui Lin Harbin Institute of Technology, Shenzhen, Yijun Yang Tencent AI Lab, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Deheng Ye Tencent AI Lab | ||
11:50 10mTalk | DeepExploitor: LLM-Enhanced Automated Exploitation of DeepLink Attack in Hybrid Apps Research Papers Zhangyue Zhang Fudan University, Lei Zhang Fudan University, Zhibo Zhang Huazhong University of Science and Technology, Yongheng Liu Fudan University, Zhemin Yang Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University | ||
12:00 10mTalk | Demystifying Cookie Sharing Risks in WebView-based Mobile App-in-app Ecosystems Research Papers Miao Zhang Beijing University of Posts and Telecommunications, Shenao Wang Huazhong University of Science and Technology, Guilin Zheng Beijing University of Posts and Telecommunications, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
12:10 10mTalk | Hit The Bullseye On The First Shot: Improving LLMs Using Multi-Sample Self-Reward Feedback for Vulnerability Repair Research Papers Rui Jiao Xidian University, Yue Zhang Drexel University, Jinku Li Xidian University, Jianfeng Ma Xidian University | ||
12:20 10mTalk | Propagation-Based Vulnerability Impact Assessment for Software Supply Chains Research Papers Bonan Ruan National University of Singapore, Zhiwei Lin National University of Singapore, Jiahao Liu National University of Singapore, Chuqi Zhang National University of Singapore, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore Pre-print | ||
11:00 - 12:30 | |||
11:00 10mTalk | Learning Project-wise Subsequent Code Edits via Interleaving Neural-based Induction and Tool-based Deduction Research Papers Chenyan Liu Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yuhuan Huang Shanghai Jiao Tong University, Jiaxin Chang Shanghai Jiao Tong University, Binhang Qi National University of Singapore, Bo Jiang Bytedance Network Technology, Zhiyong Huang National University of Singapore, Jin Song Dong National University of Singapore | ||
11:10 10mTalk | Coding-Fuse: Efficient Fusion of Code Pre‑Trained Models for Classification Tasks Research Papers Yu Zhao , Lina Gong Nanjing University of Aeronautics and Astronautic, Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, Yuchen Jin Nanjing University of Aeronautics and Astronautics, Mingqiang Wei Nanjing University of Aeronautics and Astronautics | ||
11:20 10mTalk | SE-Jury: An LLM-as-Ensemble-Judge Metric for Narrowing the Gap with Human Evaluation in SE Research Papers Xin Zhou Singapore Management University, Singapore, Kisub Kim DGIST, Ting Zhang Monash University, Martin Weyssow Singapore Management University, Luis F. Gomes Carnegie Mellon University, Guang Yang , Kui Liu Huawei, Xin Xia Zhejiang University, David Lo Singapore Management University | ||
11:30 10mTalk | iKnow: an Intent-Guided Chatbot for Cloud Operations with Retrieval-Augmented Generation Research Papers Junjie Huang The Chinese University of Hong Kong, Yuedong Zhong Sun Yat-sen University, Guangba Yu The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Minzhi Yan HCC Lab, Huawei Cloud Computing Technology Co., Ltd, Wenfei Luan HCC Lab, Huawei Cloud Computing Technology Co., Ltd, Tianyu Yang HCC Lab, Huawei Cloud Computing Technology Co., Ltd, Rui Ren Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Michael Lyu The Chinese University of Hong Kong | ||
11:40 10mTalk | Aligning LLMs to Fully Utilize the Cross-file Context in Repository-level Code Completion Research Papers Jia Li Tsinghua University, Hao Zhu Peking University, Huanyu Liu , Xianjie Shi Peking University, He Zong aiXcoder, Yihong Dong Peking University, Kechi Zhang Peking University, China, Siyuan Jiang , Zhi Jin Peking University, Ge Li Peking University | ||
11:50 10mTalk | From Sparse to Structured: A Diffusion-Enhanced and Feature-Aligned Framework for Coincidental Correctness Detection Research Papers Huan Xie Chongqing University, Chunyan Liu Chongqing University, Yan Lei Chongqing University, Zhenyu Wu School of Big Data & Software Engineering, Chongqing University, Jinping Wang Chonqing University | ||
12:00 10mTalk | Watson: A Cognitive Observability Framework for the Reasoning of LLM-Powered Agents Research Papers Benjamin Rombaut Centre for Software Excellence, Huawei Canada, Sogol Masoumzadeh Mcgill University, Kirill Vasilevski Huawei Canada, Dayi Lin Centre for Software Excellence, Huawei Canada, Ahmed E. Hassan Queen’s University | ||
12:10 10mTalk | Understanding Software Engineering Agents: A Study of Thought-Action-Result Trajectories Research Papers Islem BOUZENIA University of Stuttgart, Michael Pradel CISPA Helmholtz Center for Information Security | ||
12:20 10mTalk | Triangle: Empowering Incident Triage with Multi-Agent Research Papers Zhaoyang Yu Tsinghua University, Aoyang Fang Chinese University of Hong Kong, Shenzhen, Minghua Ma Microsoft, Jaskaran Singh Walia Microsoft, Chaoyun Zhang Microsoft, Shu Chi Tsinghua University, Ze Li Microsoft Azure, Murali Chintalapati Microsoft Azure, Xuchao Zhang Microsoft, Rujia Wang Microsoft, Chetan Bansal Microsoft Research, Saravan Rajmohan Microsoft, Qingwei Lin Microsoft, Shenglin Zhang Nankai University, Dan Pei Tsinghua University, Pinjia He Chinese University of Hong Kong, Shenzhen | ||
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Catering | ||
14:00 - 15:30 | |||
14:00 10mTalk | Exploring Static Taint Analysis in LLMs: A Dynamic Benchmarking Framework for Measurement and Enhancement Research Papers Haoran Zhao Fudan University, Lei Zhang Fudan University, Keke Lian Fudan University, Fute Sun Fudan University, Bofei Chen Fudan University, Yongheng Liu Fudan University, Zhiyu Wu Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University | ||
14:10 10mTalk | EPSO: A Caching-Based Efficient Superoptimizer for BPF Bytecode Research Papers Qian Zhu Nanjing University, Yuxuan Liu Nanjing University, Ziyuan Zhu Nanjing University, Shangqing Liu Nanjing University, Lei Bu Nanjing University | ||
14:20 10mTalk | GNNContext: GNN-based Code Context Prediction for Programming Tasks Journal-First Track Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, Shun Liu Zhejiang University, Kaiwen Yang Zhejiang University, David Lo Singapore Management University, Xiaohu Yang Zhejiang University | ||
14:30 10mTalk | R3-Bench: Reproducible Real-world Reverse Engineering Dataset for Symbol Recovery Research Papers Muzhi Yu Peking University and Alibaba Group, Zhengran Zeng Peking University, Wei Ye Peking University, Jinan Sun Peking University, Xiaolong Bai Alibaba Group, Shikun Zhang Peking University | ||
14:40 10mTalk | Protecting Source Code Privacy When Hunting Memory Bugs Research Papers Jielun Wu Nanjing University, Bing Shui Nanjing University, Hongcheng Fan Nanjing University, Shengxin Wu Nanjing University, Rongxin Wu Xiamen University, Yang Feng Nanjing University, Baowen Xu Nanjing University, Qingkai Shi Nanjing University | ||
14:50 10mTalk | Latra: A Template-Based Language-Agnostic Transformation Framework for Effective Program Reduction Research Papers Zhenyang Xu University of Waterloo, Yiran Wang University of Waterloo, Yongqiang Tian Monash University, Mengxiao Zhang University of Waterloo, Chengnian Sun University of Waterloo | ||
15:00 10mTalk | When Control Flows Deviate: Directed Grey-box Fuzzing with Probabilistic Reachability Analysis Research Papers Peihong Lin National University of Defense Technology, Pengfei Wang National University of Defense Technology, Xu Zhou National University of Defense Technology, Wei Xie University of Science and Technology of China, Xin Ren National University of Defense Technology, Kai Lu National University of Defense Technology, China | ||
15:10 10mTalk | EditFusion: Resolving Code Merge Conflicts via Edit Selection Research Papers Changxin Wang Nanjing University, Yiming Ma Nanjing University, Lei Xu Nanjing University, Weifeng Zhang Nanjing University of Posts and Telecommunications | ||
15:20 10mTalk | Detecting Semantic Clones of Unseen Functionality Research Papers Konstantinos Kitsios University of Zurich, Francesco Sovrano Collegium Helveticum, ETH Zurich, Switzerland; Department of Informatics, University of Zurich, Switzerland, Earl T. Barr University College London, Alberto Bacchelli University of Zurich Pre-print | ||
14:00 - 15:30 | |||
14:00 10mTalk | RSFuzz: A Robustness-Guided Swarm Fuzzing Framework Based on Behavioral Constraints Research Papers Ruoyu Zhou School of Computer Science and Technology, Xidian University, Xi'an, China; Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China, Zhiwei Zhang School of Computer Science and Technology, Xidian University, Xi'an, China; Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China, Haocheng Han School of Computer Science and Technology, Xidian University, Xi'an, China; Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China, Xiaodong Zhang University of Chinese Academy of Science, Zehan Chen School of Computer Science and Technology, Xidian University, Xi’an, China; Shaanxi Key Laboratory of Network and System Security , Xidian University, Jun Sun Singapore Management University, Yulong Shen Xidian University, Dehai Xu Yiqiyin (Hangzhou) Technology Co., Ltd. Xi'an Branch, Xi'an, China | ||
14:10 10mTalk | DualFuzz: Detecting Vulnerability in Wi-Fi NICs through Dual-Directional Fuzzing Research Papers Yuanliang Chen Tsinghua University, Fuchen Ma Tsinghua University, Yanyang Zhao Tsinghua University, Yuanyi Li Shuimu Yulin Technology Co., Ltd, Yu Jiang Tsinghua University | ||
14:20 10mTalk | ORFuzz: Fuzzing the "Other Side" of LLM Safety – Testing Over-Refusal Research Papers Haonan Zhang Zhejiang University, Dongxia Wang Zhejiang University, Yi Liu Nanyang Technological University, Kexin Chen Zhejiang University, Jiashui Wang Zhejiang University, Xinlei Ying Ant Group, Long Liu Ant Group, Wenhai Wang Zhejiang University Pre-print | ||
14:30 10mTalk | DNAFuzz: Descriptor-Aware Fuzzing for USB Drivers Research Papers Zhengshu Wang Hubei University, Peng He Hubei University, Fuchen Ma Tsinghua University, Yuanliang Chen Tsinghua University, Shuoshuo Duan Shuimu Yulin Technology Co., Ltd, Yiyuan Bai Shuimu Yulin Technology Co., Ltd, Yu Jiang Tsinghua University | ||
14:40 10mTalk | ARG: Testing Query Rewriters via Abstract Rule Guided Fuzzing Research Papers Dawei Li Beihang University, Yuxiao Guo Beihang University, Qifan Liu Beihang University, Jie Liang Beihang University, Zhiyong Wu Tsinghua University, China, Jingzhou Fu School of Software, Tsinghua University, Chi Zhang Tsinghua University, Yu Jiang Tsinghua University | ||
14:50 10mTalk | Algernon: A Flag-Guided Hybrid Fuzzer for Unlocking Hidden Program Paths Research Papers Peng Deng Fudan University, Lei Zhang Fudan University, Jingqi Long Fudan University, Wenzheng Hong Independent, Zhemin Yang Fudan University, Yuan Zhang Fudan University, Donglai Zhu Fudan University, Min Yang Fudan University | ||
15:00 10mTalk | Interleaved Learning and Exploration: A Self-Adaptive Fuzz Testing Framework for MLIR Research Papers Zeyu Sun Institute of Software, Chinese Academy of Sciences, Jingjing Liang East China Normal University, Weiyi Wang Institute of Software, Chinese Academy of Sciences, Chenyao Suo Tianjin University, Junjie Chen Tianjin University, Fanjiang Xu Institute of Software at Chinese Academy of Sciences | ||
15:10 10mTalk | RCFuzz: Recommendation-based Collaborative Fuzzer Journal-First Track | ||
15:20 10mTalk | WingMuzz: Blackbox Testing of IoT Protocols via Two-dimensional Fuzzing Schedule Research Papers Xiaogang Zhu The University of Adelaide, Enze Dai Shenzhen International Graduate School, Tsinghua University, Xiaotao Feng 360 Vulnerability Research Institute, Shaohua Wang Central University of Finance and Economics, Xin Xia Zhejiang University, Sheng Wen Swinburne University of Technology, Kwok-Yan Lam Nanyang Technological University, Singapore, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology | ||
14:00 - 15:30 | |||
14:00 10mTalk | Enhancing LLMs with Staged Grouping and Dehallucination for Header File Decomposition Research Papers Yue Wang Peking University, Jiaxuan Sun Peking University, Yanzhen Zou Peking University, Bing Xie Peking University | ||
14:10 10mResearch paper | Speculative Automated Refactoring of Imperative Deep Learning Programs to Graph Execution Research Papers Raffi Khatchadourian CUNY Hunter College, Tatiana Castro Vélez University of Puerto Rico, Rio Piedras Campus, Mehdi Bagherzadeh Oakland University, Nan Jia City University of New York (CUNY) Graduate Center, Anita Raja City University of New York (CUNY) Hunter College Pre-print Media Attached | ||
14:20 10mTalk | An Empirical Study of Python Library Migration Using Large Language Models Research Papers Mohayeminul Islam University of Alberta, Ajay Jha North Dakota State University, May Mahmoud New York University Abu Dhabi, Ildar Akhmetov Northeastern University, Sarah Nadi New York University Abu Dhabi | ||
14:30 10mTalk | Measuring the Impact of Predictive Models on the Software Project: A Cost, Service Time, and Risk Evaluation of a Metric-based Defect Severity Prediction Model Journal-First Track Umamaheswara Sharma B National Institute of Technology, Calicut, Ravichandra Sadam National Institute of Technology Warangal | ||
14:40 10mTalk | Demystifying the Evolution of Neural Networks with BOM Analysis: Insights from a Large-Scale Study of 55,997 GitHub Repositories Research Papers xiaoning ren , Yuhang Ye University of Science and Technology of China, Xiongfei Wu University of Luxembourg, Yueming Wu Huazhong University of Science and Technology, Yinxing Xue Institute of AI for Industries, Chinese Academy of Sciences | ||
14:50 10mTalk | Fact-Aligned and Template-Constrained Static Analyzer Rule Enhancement with LLMs Research Papers Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Ge Wen Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
15:00 10mTalk | MCTS-Refined CoT: High-Quality Fine-Tuning Data for LLM-Based Repository Issue Resolution Research Papers Yibo Wang Northeastern University, Zhihao Peng Northeastern University, Ying Wang Northeastern University, Zhao Wei Tencent, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China | ||
15:10 10mTalk | Software Reconfiguration in Robotics Journal-First Track Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy, Sven Peldszus IT University of Copenhagen, Davide Brugali University of Bergamo, Italy, Daniel Strüber Chalmers | University of Gothenburg / Radboud University, Thorsten Berger Ruhr University Bochum | ||
15:20 10mTalk | CROSS2OH: Enabling Seamless Porting of C/C++ Software Libraries to OpenHarmony Research Papers Qian Zhang University of California at Riverside, Li Tsz On The Hong Kong University of Science and Technology, Ying Wang Northeastern University, Li Li Beihang University, Shing-Chi Cheung Hong Kong University of Science and Technology | ||
14:00 - 15:30 | |||
14:00 10mTalk | Towards Generalizable Instruction Vulnerability Prediction via LLM-Enhanced Code Representation Research Papers Bao Wen Nanjing University of Aeronautics and Astronautics, Jingjing Gu Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Yang Liu Nanyang Technological University, Pengfei Yu Nanjing University of Aeronautics and Astronautics, Yanchao Zhao Nanjing University of Aeronautics and Astronautics | ||
14:10 10mTalk | Interpretable Vulnerability Detection Reports Research Papers Claudia Mamede Carnegie Mellon University, Jose Campos FEUP & LASIGE, Claire Le Goues Carnegie Mellon University, Rui Abreu Faculty of Engineering of the University of Porto, Portugal | ||
14:20 10mTalk | Security Debt in LLM Agent Applications: A Measurement Study of Vulnerabilities and Mitigation Trade-offs Research Papers Zhuoxiang Shen Fudan University, Jiarun Dai Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University | ||
14:30 10mTalk | Altered Histories in Version Control System Repositories: Evidence from the Trenches Research Papers Solal Rapaport Télécom Paris, Institut Polytechnique de Paris, Laurent Pautet Télécom Paris, Institut Polytechnique de Paris, Samuel Tardieu Télécom Paris, Institut Polytechnique de Paris, Stefano Zacchiroli LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France Pre-print | ||
14:40 10mTalk | Lares: LLM-driven Code Slice Semantic Search for Patch Presence Testing Research Papers Siyuan Li University of Chinese Academy of Sciences & Institute of Information Engineering Chinese Academy of Sciences, China, Yaowen Zheng Institute of Information Engineering at Chinese Academy of Sciences, Hong Li Institute of Information Engineering at Chinese Academy of Sciences, Jingdong Guo Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Chunpeng Yan Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Weijie Wang Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Yimo Ren Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Hongsong Zhu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
14:50 10mTalk | PoliCond: Condition-Aware Ontology-Driven LLMs for Privacy Policy Analysis Research Papers Yalin Feng Nanjing University, Yifei Lu State Key Laboratory for Novel Software Technology, Nanjing University, China, Minxue Pan Nanjing University | ||
15:00 10mTalk | Understanding Resource Injection Vulnerabilities in Kubernetes Ecosystems Research Papers Defang Bo Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Jie Lu Institute of Computing Technology of the Chinese Academy of Sciences, Feng Li Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Jingting Chen Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Jinchen Wang Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Chendong Yu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences | ||
15:10 10mTalk | LLM-Powered Static Binary Taint Analysis Journal-First Track Puzhuo Liu Ant Group & Tsinghua University, Chengnian Sun University of Waterloo, Yaowen Zheng Institute of Information Engineering at Chinese Academy of Sciences, Xuan Feng Independent Researcher, Chuan Qin Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Yuncheng Wang Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, UCAS Beijing, China, Zhenyang Xu University of Waterloo, Zhi Li Institute of Information Engineering, Chinese Academy of Sciences, China, Peng Di Ant Group & UNSW Sydney, Yu Jiang Tsinghua university, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
15:20 10mTalk | Stealthy Backdoor Attack for Code Models Journal-First Track Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Bowen Xu North Carolina State University, Jie M. Zhang King's College London, Hong Jin Kang University of Sydney, Jieke Shi Singapore Management University, Junda He Singapore Management University, David Lo Singapore Management University | ||
14:00 - 15:30 | |||
14:00 10mTalk | Leveraging Mixture-of-Experts Framework for Smart Contract Vulnerability Repair with Large Language Model Research Papers Hang Yuan Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Xizhi Hou Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lei Yu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Li Yang Institute of Software, Chinese Academy of Sciences, Jiayue Tang Institute of Software, CAS, Univ. of Chinese Academy of Sciences, Jiadong Xu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Yifei Liu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Fengjun Zhang Institute of Software, Chinese Academy of Sciences, China, Chun Zuo Sinosoft | ||
14:10 10mTalk | Why Is My Transaction Risky? Understanding Smart Contract Semantics and Interactions in the NFT Ecosystem Research Papers Yujing Chen Zhejiang University, Xuanming Liu Zhejiang University, Zhiyuan Wan Zhejiang University, Zuobin Wang Zhejiang University, David Lo Singapore Management University, Difan Xie Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Xiaohu Yang Zhejiang University | ||
14:20 10mTalk | Demystifying OpenZeppelin's Own Vulnerabilities and Analyzing Their Propagation in Smart Contracts Research Papers Han Liu The Hong Kong University of Science and Technology, Daoyuan Wu Lingnan University, Yuqiang Sun Nanyang Technological University, Shuai Wang Hong Kong University of Science and Technology, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University | ||
14:30 10mTalk | PROMFUZZ: Leveraging LLM-Driven and Bug-Oriented Composite Analysis for Detecting Functional Bugs in Smart Contracts Research Papers Xingshuang Lin Zhejiang University, Qinge Xie Georgia Institute of Technology, Binbin Zhao Zhejiang University, Yuan Tian , Saman Zonouz Georgia Institute of Technology, Na Ruan Shanghai Jiaotong University, Jiliang Li Xi'an Jiaotong University, Raheem Beyah Georgia Institute of Technology, Shouling Ji Zhejiang University | ||
14:40 10mTalk | VeriExploit: Automatic Bug Reproduction in Smart Contracts via LLMs and Formal Methods Research Papers Chenfeng Wei The University of Manchester, Shiyu Cai The University of Manchester, Yiannis Charalambous The University of Manchester, Tong Wu , Sangharatna Godboley NIT Warangal, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil | ||
14:50 10mTalk | SolContractEval: A Benchmark for Evaluating Contract-Level Solidity Code Generation Research Papers Zhifan Ye Zhejiang University, Jiachi Chen Sun Yat-sen University, Zhenzhe Shao Sun Yat-sen University, Lingfeng Bao Zhejiang University, Xiaohu Yang Zhejiang University, Zhongxin Liu Zhejiang University | ||
15:00 10mTalk | PrefGen: A Preference-Driven Methodology for Secure Yet Gas-Efficient Smart Contract Generation Research Papers Zhiyuan Peng Shanghai Jiao Tong University, Xin Yin Zhejiang University, Zijie Zhou China University of Petroleum (Beijing), Chenhao Ying Shanghai Jiao Tong University, Chao Ni Zhejiang University, Yuan Luo Shanghai Jiao Tong University Pre-print | ||
15:10 10mTalk | Soleker: Uncovering Vulnerabilities in Solana Smart Contracts Research Papers Kunsong Zhao The Hong Kong Polytechnic University, Yunpeng Tian The Hong Kong Polytechnic University, Zuchao Ma The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University | ||
15:20 10mTalk | Have We Solved Access Control Vulnerability Detection in Smart Contracts? A Benchmark Study Research Papers Han Liu The Hong Kong University of Science and Technology, Daoyuan Wu Lingnan University, Yuqiang Sun Nanyang Technological University, Shuai Wang Hong Kong University of Science and Technology, Yang Liu Nanyang Technological University | ||
14:00 - 15:30 | |||
14:00 10mTalk | Quantum Circuit Mutants: Empirical Analysis and Recommendations Journal-First Track Eñaut Mendiluze Usandizaga Simula Research Laboratory, Norway, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Paolo Arcaini National Institute of Informatics
| ||
14:10 10mTalk | MET-MAPF: A Metamorphic Testing Approach for Multi-Agent Path Finding Algorithms Journal-First Track Xiao-Yi Zhang University of Science and Technology Beijing, Yang Liu Nanyang Technological University, Paolo Arcaini National Institute of Informatics
, Mingyue Jiang Zhejiang Sci-Tech University, Zheng Zheng Beihang University | ||
14:20 10mTalk | State Field Coverage: A Metric for Oracle Quality Research Papers Facundo Molina IMDEA Software Institute, Nazareno Aguirre University of Rio Cuarto and CONICET, Alessandra Gorla IMDEA Software Institute | ||
14:30 10mTalk | Do LLMs Generate Useful Test Oracles? An Empirical Study with an Unbiased Dataset Research Papers Davide Molinelli USI Lugano; Schaffhausen Institute of Technology, Luca Di Grazia University of St. Gallen, Alberto Martin-Lopez Software Institute - USI, Lugano, Michael D. Ernst University of Washington, Mauro Pezze Università della Svizzera italiana (USI) and Università degli Studi di Milano Bicocca | ||
14:40 10mTalk | Finding Safety Violations of AI-Enabled Control Systems through the Lens of Synthesized Proxy Programs Journal-First Track Jieke Shi Singapore Management University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Junda He Singapore Management University, Bowen Xu North Carolina State University, Dongsun Kim Korea University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University Link to publication DOI Pre-print | ||
14:50 10mTalk | ZendDiff: Differential Testing of PHP Interpreter Research Papers Yuancheng Jiang National University of Singapore, Jianing Wang National University of Singapore, Qiange Liu Beihang University, Yeqi Fu National University of Singapore, Jian Mao Beihang University, Roland H. C. Yap National University of Singapore, Zhenkai Liang National University of Singapore | ||
15:00 10mTalk | SATORI: Static Test Oracle Generation for REST APIs Research Papers Juan C. Alonso Universidad de Sevilla, Alberto Martin-Lopez Software Institute - USI, Lugano, Sergio Segura SCORE Lab, I3US Institute, Universidad de Sevilla, Seville, Spain, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Antonio Ruiz-Cortés University of Seville | ||
15:10 10mTalk | Exact Inference for Quantum Circuits: A Testing Oracle for Quantum Software Stacks Research Papers | ||
15:20 10mTalk | Identifying inconsistent software defect predictions with symmetry metamorphic relation pattern Journal-First Track Chan Pak Yuen Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong, China, Jacky Keung City University of Hong Kong, Zhen Yang Shandong University | ||
15:00 - 18:00 | |||
15:00 3hDemonstration | APIDA-Chat: Structured Synthesis of API Search Dialogues to Bootstrap Conversational Agents Tool Demonstration Track | ||
15:00 3hDemonstration | PROXiFY: A Bytecode Analysis Tool for Detecting and Classifying Proxy Contracts in Ethereum Smart Contracts Tool Demonstration Track Ilham Qasse Reykjavik University, Mohammad Hamdaqa Polytechnique Montreal, Björn Þór Jónsson Reykjavik University | ||
15:00 3hDemonstration | DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning Tool Demonstration Track Yixuan Liu Nanyang Technological University, Xinlei Li Nanyang Technological University, Yi Li Nanyang Technological University Pre-print | ||
15:00 3hDemonstration | WIBE: Watermarks for generated Images - Benchmarking & Evaluation Tool Demonstration Track Aleksey Yakushev ISP RAS, Aleksandr Akimenkov ISP RAS, Khaled Abud MSU AI Institute, Dmitry Obydenkov ISP RAS, Irina Serzhenko MIPT, Kirill Aistov Huawei Research Center, Egor Kovalev MSU, Stanislav Fomin ISP RAS, Anastasia Antsiferova ISP RAS Research Center, MSU AI Institute, Kirill Lukianov ISP RAS Research Center, MIPT, Yury Markin ISP RAS | ||
15:00 3hDemonstration | EyeNav: Accessible Webpage Interaction and Testing using Eye-tracking and NLP Tool Demonstration Track Juan Diego Yepes-Parra Universidad de los Andes, Colombia, Camilo Escobar-Velásquez Universidad de los Andes, Colombia Link to publication Media Attached | ||
15:00 3hDemonstration | Quirx: A Mutation-Based Framework for Evaluating Prompt Robustness in LLM-based Software Tool Demonstration Track Souhaila Serbout University of Zurich, Zurich, Switzerland | ||
15:00 3hDemonstration | BenGQL: An Extensible Benchmarking Framework for Automated GraphQL Testing Tool Demonstration Track Media Attached | ||
15:00 3hDemonstration | evalSmarT: An LLM-Based Evaluation Framework for Smart Contract Comment Generation Tool Demonstration Track Fatou Ndiaye MBODJI SnT, University of Luxembourg, Mame Marieme Ciss SOUGOUFARA UCAD, Senegal, Wendkuuni Arzouma Marc Christian OUEDRAOGO SnT, University of Luxembourg, Alioune Diallo University of Luxembourg, Kui Liu Huawei, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg Pre-print | ||
15:00 3hDemonstration | LLMorph: Automated Metamorphic Testing of Large Language Models Tool Demonstration Track Steven Cho The University of Auckland, New Zealand, Stefano Ruberto JRC European Commission, Valerio Terragni University of Auckland | ||
15:00 3hDemonstration | TRUSTVIS: A Multi-Dimensional Trustworthiness Evaluation Framework for Large Language Models Tool Demonstration Track Ruoyu Sun University of Alberta, Canada, Da Song University of Alberta, Jiayang Song Macau University of Science and Technology, Yuheng Huang The University of Tokyo, Lei Ma The University of Tokyo & University of Alberta | ||
15:00 3hDemonstration | GUI-ReRank: Enhancing GUI Retrieval with Multi-Modal LLM-based Reranking Tool Demonstration Track Kristian Kolthoff Institute for Software and Systems Engineering, Clausthal University of Technology, Felix Kretzer human-centered systems Lab (h-lab), Karlsruhe Institute of Technology (KIT) , Christian Bartelt Institute for Software and Systems Engineering, TU Clausthal, Alexander Maedche human-centered systems Lab (h-lab), Karlsruhe Institute of Technology (KIT) , Simone Paolo Ponzetto Data and Web Science Group, University of Mannheim Pre-print Media Attached | ||
15:00 3hDemonstration | StackPlagger: A System for Identifying AI-Code Plagiarism on Stack Overflow Tool Demonstration Track Aman Swaraj Dept. of Computer Science & Engineering, Indian Institute of Technology, Roorkee, India, Harsh Goyal Indian Institute of Technology, Roorkee, Sumit Chadgal Indian Institute of Technology, Roorkee, Sandeep Kumar Dept. of Computer Science & Engineering, Indian Institute of Technology, Roorkee, India | ||
15:00 3hDemonstration | AgentDroid: A Multi-Agent Tool for Detecting Fraudulent Android Applications Tool Demonstration Track Ruwei Pan Chongqing University, Hongyu Zhang Chongqing University, Zhonghao Jiang , Ran Hou Chongqing University | ||
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Catering | ||
16:00 - 17:00 | |||
16:00 10mTalk | Automated Prompt Generation for Code Intelligence: An Empirical study and Experience in WeChat Industry Showcase Kexing Ji , Shiyun Fu The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Yujia Chen The Chinese University of Hong Kong, Zezhou Yang Tencent Inc., Chaozheng Wang The Chinese University of Hong Kong, Yuetang Deng Tencent | ||
16:10 10mTalk | Evaluating Large Language Models for Functional and Maintainable Code in Industrial Settings: A Case Study at ASML Industry Showcase Yash Mundhra Delft University of Technology, Max Valk ASML, Maliheh Izadi Delft University of Technology | ||
16:20 10mTalk | IntelliTopo: An IaC Generation Service for Industrial Network Topology Construction Industry Showcase Mingyu Shao Harbin Institute of Technology, Shenzhen; PengCheng Laboratory, Zhao Liu PengCheng Laboratory, Weihong Han Peng Cheng Laboratory, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Jiachen Liu Harbin Institute of Technology, Shenzhen, Qing Liao Harbin Institute of Technology | ||
16:30 10mTalk | RepoMasterEval: Evaluating Code Completion via Real-World Repositories Industry Showcase Qinyun Wu Bytedance Ltd., Chao Peng ByteDance, Pengfei Gao ByteDance, Ruida Hu Harbin Institute of Technology, Shenzhen, Haoyu Gan ByteDance, Bo Jiang Bytedance Network Technology, Jinhe Tang ByteDance, Zhiwen Deng ByteDance, Zhanming Guan ByteDance, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Xia Liu ByteDance, Ping Yang Bytedance Network Technology | ||
16:40 10mTalk | Multiple Schema-Conformant Declarative Code Generation NIER Track | ||
16:50 10mTalk | Tuning LLM-based Code Optimization via Meta-Prompting: An Industrial Perspective Industry Showcase Jingzhi Gong University of Leeds, Rafail Giavrimis Turing Intelligence Technology, Paul Brookes TurinTech AI, Vardan Voskanyan TurinTech AI, Fan Wu TurinTech AI, Mari Ashiga University of West London/TurinTech AI, Matthew Truscott TurinTech AI, Michail Basios Turing Intelligence Technology, Leslie Kanthan TurinTech AI, Jie Xu University of Leeds, Zheng Wang University of Leeds | ||
16:00 - 17:00 | |||
16:00 10mTalk | Measuring Software Resilience Using Socially Aware Truck Factor Estimation NIER Track Alexis Butler Royal Holloway University of London, Dan O'Keeffe Royal Holloway, University of London, Santanu Dash University of Surrey | ||
16:10 10mTalk | Should We Evaluate LLM Based Security Analysis Approaches on Open Source Systems? Industry Showcase Kohei Dozono Technical University of Munich, Jonas Engesser Technical University of Munich, Benjamin Hummel CQSE GmbH, Alexander Pretschner TU Munich, Tobias Roehm CQSE GmbH | ||
16:20 10mTalk | DALEQ - Explainable Equivalence for Java Bytecode Industry Showcase | ||
16:30 10mTalk | A Secure Mocking Approach towards Software Supply Chain Security NIER Track Daisuke Yamaguchi NTT, Inc., Shinobu Saito NTT, Inc., Takuya Iwatsuka NTT, Nariyoshi Chida NTT, Inc, Tachio Terauchi Waseda University | ||
16:40 10mTalk | TRON: Fuzzing Linux Network Stack via Protocol-System Call Payload Synthesis Industry Showcase Qiang Zhang Hunan University, Yifei Chu Tsinghua University, Yuheng Shen Tsinghua University, Jianzhong Liu Tsinghua University, Heyuan Shi Central South University, Yu Jiang Tsinghua University, Wanli Chang College of Computer Science and Electronic Engineering, Hunan University | ||
16:50 10mTalk | Industry Practice of LLM-Assisted Protocol Fuzzing for Commercial Communication Modules Industry Showcase Qiang Fu Central South University, Changjian Liu Central South University, Yuan Ding China Mobile IoT, Chao Fan China Mobile IoT, Yulai Fu , Yuhan Chen Central South Sniversity, Ying Fu Tsinghua University, Ronghua Shi Central South University, Fuchen Ma Tsinghua University, Heyuan Shi Central South University | ||
16:00 - 17:00 | |||
16:00 10mTalk | An Empirical Study on UI Overlap in OpenHarmony Applications Industry Showcase | ||
16:10 10mTalk | Metrics Driven Reengineering and Continuous Code Improvement at Meta Industry Showcase Audris Mockus University of Tennessee, Peter C Rigby Meta / Concordia University, Rui Abreu Meta, Nachiappan Nagappan Meta Platforms, Inc. | ||
16:20 10mTalk | Prompt-with-Me: in-IDE Structured Prompt Management for LLM-Driven Software Engineering Industry Showcase Ziyou Li Delft University of Technology, Agnia Sergeyuk JetBrains Research, Maliheh Izadi Delft University of Technology | ||
16:30 10mTalk | Are We SOLID Yet? An Empirical Study on Prompting LLMs to Detect Design Principle Violations NIER Track Fatih Pehlivan Bilkent University, Arçin Ülkü Ergüzen Bilkent University, Sahand Moslemi Yengejeh Bilkent University, Mayasah Lami Bilkent University, Anil Koyuncu Bilkent University | ||
16:40 10mTalk | Shrunk, Yet Complete: Code Shrinking-Resilient Android Third-Party Library Detection Industry Showcase Jingkun Zhang Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Tianyue Luo Institute of Software, Chinese Academy of Sciences, Bolin Zhou Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mutian Yang Beijing ZhongKeWeiLan Technology Co.,Ltd. | ||
16:50 10mTalk | LLM-Guided Genetic Improvement: Envisioning Semantic Aware Automated Software Evolution NIER Track Karine Even-Mendoza King’s College London, Alexander E.I. Brownlee University of Stirling, Alina Geiger Johannes Gutenberg University Mainz, Carol Hanna University College London, Justyna Petke University College London, Federica Sarro University College London, Dominik Sobania Johannes Gutenberg-Universität Mainz | ||
16:00 - 17:00 | |||
16:00 10mTalk | Adaptive Performance Regression Detection via Semi-Supervised Siamese Learning Industry Showcase Yongqian Sun Nankai University, Mengyao Li Nankai University, Xiao Xiong Nankai University, Lei Tao Nankai University, Yimin Zuo Nankai University, Wenwei Gu The Chinese University of Hong Kong, Shenglin Zhang Nankai University, Junhua Kuang Nankai University, Yu Luo Nankai University, Huandong Zhuang Huawei Cloud, Bowen Deng Huawei Cloud, Dan Pei Tsinghua University | ||
16:10 10mTalk | Deploying Language Models on Android-Based Edge Devices: A Practical Evaluation Pipeline Industry Showcase Suayder Costa Venturus - Innovation & Technology, Igor Lima Venturus - Innovation & Technology, William Harada Venturus - Innovation & Technology, Mateus Lucena Venturus - Innovation & Technology, Arthur Alves Venturus - Innovation & Technology, Ruan Belem TPV Technology, Agemilson Pimentel TPV Technology, Rômulo Fabrício TPV Technology, Alexandre Miranda Paulo Feitoza Foundation- FPFTech, Daniel Lins Venturus - Innovation & Technology, Frederico Goncalves Venturus - Innovation & Technology, Sidney Leal Venturus - Innovation & Technology | ||
16:20 10mTalk | How Can Infrastructure as Code Accelerate Data Center Bring-ups? A Case Study at ByteDance Industry Showcase Xianhao Jin ByteDance, Yifei Feng ByteDance, Yufei Gao ByteDance, Yongning Hu ByteDance, Jie Huang ByteDance, Kun Xia ByteDance, Luchuan Guo ByteDance | ||
16:30 10mTalk | MobileUPReg: Identifying User-Perceived Performance Regressions in Mobile OS Versions Industry Showcase Wei Liu Concordia University, Montreal, Canada, Yi Wen HENG Concordia University, Feng Lin Concordia University, Tse-Hsun (Peter) Chen Concordia University, Ahmed E. Hassan Queen’s University | ||
16:40 10mTalk | Context-Aware CodeLLM Eviction for AI-assisted Coding Industry Showcase Kishanthan Thangarajah Centre for Software Excellence, Huawei Canada, Boyuan Chen Centre for Software Excellence, Huawei Canada, Shi Chang University of Western Ontario, Ahmed E. Hassan Queen’s University | ||
16:50 10mTalk | Thinking Longer, Not Larger: Enhancing Software Engineering Agents via Scaling Test-Time Compute Industry Showcase Yingwei Ma Tongyi Lab, Alibaba, Yongbin Li Tongyi Lab, Alibaba, China, Yihong Dong Peking University, Xue Jiang , Yanhao Li Tongyi Lab, Alibaba, Yue Liu Monash University, Rongyu Cao Tongyi Lab, Alibaba, China, Jue Chen Tongyi Lab, Alibaba, China, Fei Huang Tongyi Lab, Alibaba, China, Binhua Li Tongyi Lab, Alibaba, China | ||
Wed 19 NovDisplayed time zone: Seoul change
Wed 19 Nov
Displayed time zone: Seoul change
09:00 - 09:30 | |||
09:00 30mTalk | Automated Test Input Generation for Android: Are We There Yet? MIP Award Shauvik Roy Choudhary , Alessandra Gorla IMDEA Software Institute, Alessandro Orso University of Georgia, USA DOI | ||
09:30 - 10:30 | |||
09:30 60mKeynote | Hyperscale Bug Finding and Fixing: DAPRA AIxCC Keynote Taesoo Kim Georgia Institute of Technology | ||
10:30 - 11:00 | |||
10:30 30mCoffee break | Break Catering | ||
11:00 - 12:30 | |||
11:00 10mTalk | Automated Repair of Ambiguous Problem Descriptions for LLM-Based Code Generation Research Papers Haoxiang Jia Peking University, Robbie Morris University College London, He Ye University College London (UCL), Federica Sarro University College London, Sergey Mechtaev Peking University | ||
11:10 10mTalk | Fixing Broken Graphs: LLM-Powered Automatic Code Optimization for DNN Programs Research Papers Haotian Wang Nankai University, Yicheng Sui Nankai University, Yudong Xie Nankai University, Yicong Liu Nankai University, Yufei Sun Nankai University, Changqing Shi Nankai University, Yuzhi Zhang Nankai University | ||
11:20 10mTalk | SemGuard: Real-Time Semantic Evaluator for Correcting LLM-Generated Code Research Papers Qinglin Wang Shandong Normal University, Zhihong Sun Shandong Normal University, Ruyun Wang Institute of Information Engineering, Chinese Academy of Sciences, Tao Huang Shandong Normal University, Zhi Jin Peking University, Ge Li Peking University, Chen Lyu Shandong Normal University | ||
11:30 10mTalk | Amur: Fixing Multi-Resource Leaks Guided by Resource Flow Analysis Research Papers | ||
11:40 10mTalk | Automated Repair of OpenID Connect Programs Research Papers Tamjid Al Rahat University of Virginia, Yanju Chen University of California, San Diego, Yu Feng University of California at Santa Barbara, Yuan Tian | ||
11:50 10mTalk | FlakyGuard: Automatically Fixing Flaky Tests at Industry Scale Research Papers Chengpeng Li University of Texas at Austin, Farnaz Behrang Uber Technologies, August Shi The University of Texas at Austin, Peng Liu Uber Technologies | ||
12:00 10mTalk | LLMPort: Cross-file Patch Porting via Task Decomposition and Self-correction Research Papers Bofei Chen Fudan University, Lei Zhang Fudan University, Peng Deng Fudan University, Nan Wang Fudan University, Haoyu Xu Fudan University, Mingda Guo Fudan Universityv, Yuan Zhang Fudan University, Min Yang Fudan University | ||
12:10 10mTalk | Repairing Leaks in Resource Wrappers Research Papers Sanjay Malakar University of California, Riverside, Martin Kellogg New Jersey Institute of Technology, Michael D. Ernst University of Washington, Manu Sridharan University of California at Riverside | ||
12:20 10mTalk | Automatic Fixing of Missing Dependency Errors Research Papers Jun Lyu Nanjing University, He Zhang Nanjing University, Lanxin Yang Nanjing University, Yue Li Nanjing University, Chenxing Zhong Nanjing University, Manuel Rigger National University of Singapore | ||
11:00 - 12:30 | |||
11:00 10mTalk | Resolving Conditional Implicit Calls to Improve Static and Dynamic Analysis in Android Apps Journal-First Track Jordan Samhi University of Luxembourg, Luxembourg, René Just University of Washington, Michael D. Ernst University of Washington, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg | ||
11:10 10mTalk | GlassWing: A Tailored Static Analysis Approach for Flutter Android Apps Research Papers Xiangyu Zhang DISSec, NDST, College of Cyber Science, Nankai University, China, Yucheng Su Intelligence and Offensive Defense Lab, Xiaohongshu Inc., China, Lingling Fan Nankai University, Miaoying Cai DISSec, NDST, College of Cyber Science, Nankai University, China, Sen Chen Nankai University | ||
11:20 10mTalk | Characterizing and Repairing Color-Related Accessibility Issues in Android Apps Research Papers | ||
11:30 10mTalk | Generating Failure-Based Oracles to Support Testing of Reported Bugs in Android Apps Research Papers Jack Johnson University of Minnesota, Junayed Mahmud University of Central Florida, Oscar Chaparro William & Mary, Kevin Moran University of Central Florida, Mattia Fazzini University of Minnesota | ||
11:40 10mTalk | On the (In)Security of Non-resettable Device Identifiers in Custom Android Systems Research Papers Zikan Dong Beijing University of Posts and Telecommunications, Liu Wang Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology, Shenzhen, Haoyu Wang Huazhong University of Science and Technology | ||
11:50 10mTalk | Don't Mess with Bro's Cheese! An Empirical Study of Resource Conflict in Android Multi-window Research Papers Chenkai Guo Nankai University, China, Huimin Zhao College of Cryptology and Cyber Science, Nankai University, Tianhong Wang College of Computer Science, Nankai University, Naipeng Dong The University of Queensland, Australia, Qingqing Dong College of Cryptology and Cyber Science, Nankai University, Jiarui Che College of Computer Science, Nankai University, Yaqiong Qiao College of Cryptology and Cyber Science, Nankai University, Xiangyang Luo State Key Laboratory of Mathematical Engineering and Advanced Computing, Zheli Liu Nankai University | ||
12:00 10mTalk | Profile Coverage: Using Android Compilation Profiles to Evaluate Dynamic Testing Research Papers Pre-print | ||
12:10 10mTalk | NATE: A Network-Aware Testing Enhancer for Network-Related Fault Detection in Android Apps Research Papers Yuanhong Lan Nanjing University, Shaoheng Cao Nanjing University, Yifei Lu State Key Laboratory for Novel Software Technology, Nanjing University, China, Minxue Pan Nanjing University, Xuandong Li Nanjing University | ||
12:20 10mTalk | Automated Detection of Web Application Navigation Barriers for Screen Reader Users Research Papers Shubhi Jain University of California, Irvine, Syed Fatiul Huq University of California, Irvine, Ziyao He University of California, Irvine, Sam Malek University of California at Irvine | ||
11:00 - 12:30 | |||
11:00 10mTalk | Automated Inline Comment Smell Detection and Repair with Large Language Models Research Papers Hatice Kübra Çağlar Bilkent University, Semih Çağlar Bilkent University, Eray Tüzün Bilkent University Pre-print | ||
11:10 10mTalk | What’s DAT Smell? Untangling and Weaving the Disjoint Assertion Tangle Test Smell Research Papers Monil Narang University of California, Irvine, Hang Du University of California at Irvine, James Jones University of California at Irvine Pre-print | ||
11:20 10mTalk | Your Build Scripts Stink: The State of Code Smells in Build Scripts Research Papers Mahzabin Tamanna North Carolina State University, Yash Chandrani North Carolina State University, Matthew Burrows North Carolina State University, Brandon Wroblewski North Carolina State University, Dominik Wermke North Carolina State University, Laurie Williams North Carolina State University | ||
11:30 10mTalk | Do Experts Agree About Smelly Infrastructure? Journal-First Track Sogol Masoumzadeh Mcgill University, Nuno Saavedra INESC-ID and IST, University of Lisbon, Rungroj Maipradit University of Waterloo, Lili Wei McGill University, João F. Ferreira INESC-ID and IST, University of Lisbon, Daniel Varro Linköping University / McGill University, Shane McIntosh University of Waterloo | ||
11:40 10mTalk | Wired for Reuse: Automating Context-Aware Code Adaptation in IDEs via LLM-Based Agent Research Papers Taiming Wang Beijing Institute of Technology, Yanjie Jiang Peking University, Chunhao Dong Beijing Institute of Technology, Yuxia Zhang Beijing Institute of Technology, Hui Liu Beijing Institute of Technology | ||
11:50 10mTalk | BinStruct: Binary Structure Recovery Combining Static Analysis and Semantics Research Papers Yiran Zhang , Zhengzi Xu Imperial Global Singapore, Zhe Lang Institute of Information Engineering, CAS, CHENGYUE LIU , Yuqiang Sun Nanyang Technological University, Wenbo Guo School of Cyber Science and Engineering, Sichuan University, Chengwei Liu Nanyang Technological University, Weisong Sun Nanyang Technological University, Yang Liu Nanyang Technological University | ||
12:00 10mTalk | SateLight: A Satellite Application Update Framework for Satellite Computing Research Papers Jinfeng Wen Beijing University of Posts and Telecommunications, Jianshu Zhao Beijing University of Posts and Telecommunications, Zixi Zhu Beijing University of Posts and Telecommunications, Xiaomin Zhang Beijing University of Posts and Telecommunications, Qi Liang Beijing University of Posts and Telecommunications, Ao Zhou Beijing University of Posts and Telecommunications, Shangguang Wang Beijing University of Posts and Telecommunications | ||
12:10 10mTalk | ComCat: Expertise-Guided Context Generation to Enhance Code Comprehension Journal-First Track Skyler Grandel Vanderbilt University, Scott Andersen National Autonomous University of Mexico, Yu Huang Vanderbilt University, Kevin Leach Vanderbilt University | ||
12:20 10mTalk | AdaptEval: A Benchmark for Evaluating Large Language Models on Code Snippet Adaptation Research Papers Tanghaoran Zhang National University of Defense Technology, Xinjun Mao National University of Defense Technology, Shangwen Wang National University of Defense Technology, Yuxin Zhao Key Laboratory of Software Engineering for Complex Systems, National University of Defense Technology, Yao Lu National University of Defense Technology, Jin Zhang Hunan Normal University, Zhang Zhang Key Laboratory of Software Engineering for Complex Systems, National University of Defense Technology, Kang Yang National University of Defense Technology, Yue Yu PengCheng Lab | ||
11:00 - 12:30 | |||
11:00 10mTalk | When Does Wasm Malware Detection Fail? A Systematic Analysis of Their Robustness to Evasion Research Papers Taeyoung Kim Sungkyunkwan University, Sanghak Oh Sungkyunkwan University, Kiho Lee ETRI (Electronics and Telecommunications Research Institute), South Korea, Weihang Wang University of Southern California, Yonghwi Kwon University of Maryland, Sanghyun Hong Oregon State University, Hyoungshick Kim Sungkyunkwan University | ||
11:10 10mTalk | RFCAudit: AI Agent for Auditing Protocol Implementations Against RFC Specifications Research Papers Mingwei Zheng Purdue University, Chengpeng Wang Purdue University, Xuwei Liu Purdue University, USA, Jinyao Guo Purdue University, Shiwei Feng Purdue University, Xiangyu Zhang Purdue University | ||
11:20 10mTalk | Time to separate from StackOverflow and match with ChatGPT for encryption Journal-First Track | ||
11:30 10mTalk | Demystifying Cross-Language C/C++ Binaries: A Robust Software Component Analysis Approach Research Papers Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, Wei Tang HUA WEI, Xian Zhan HUA WEI, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China | ||
11:40 10mTalk | Detecting Various DeFi Price Manipulations with LLM Reasoning Research Papers Juantao Zhong Lingnan University, Daoyuan Wu Lingnan University, Ye Liu Singapore Management University, Maoyi Xie Nanyang Technological University, Yang Liu Nanyang Technological University, Yi Li Nanyang Technological University, Ning Liu City University of Hong Kong | ||
11:50 10mTalk | Uncovering Prompt Elements: Cloning System Prompts from Behavioral Traces Research Papers Yi Qian State Key Laboratory for Novel Software Technology, Nanjing University, Pengfei State Key Laboratory for Novel Software Technology, Nanjing University, Hao Wu , Ligeng Chen Honor Device Co., Ltd, Bing Mao Nanjing University | ||
12:00 10mTalk | CRYPTBARA: Dependency-Guided Detection of Python Cryptographic API Misuses Research Papers | ||
12:10 10mTalk | A Large Scale Study of AI-based Binary Function Similarity Detection Techniques for Security Researchers and Practitioners Research Papers Jingyi Shi Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Yufeng Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Xiao Chinese Academy of Sciences, Yuekang Li UNSW, Zhengzi Xu Imperial Global Singapore, Sihao Qiu Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Chi Zhang Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Keyu Qi Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xingchu Chen Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yanyan Zou Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences | ||
12:20 10mTalk | FirmProj: Detecting Firmware Leakage in IoT Update Processes via Companion App Analysis Research Papers Wenzhi Li Shandong University, Jialong Guo Shandong University, Jiongyi Chen National University of Defense Technology, Fan Li Shandong University, Yujie Xing Shandong University, Yanbo Xu Shanghai Jiao Tong University, Shishuai Yang Shandong University, Wenrui Diao Shandong University | ||
11:00 - 12:30 | |||
11:00 10mTalk | PALM: Synergizing Program Analysis and LLMs to Enhance Rust Unit Test Coverage Research Papers | ||
11:10 10mTalk | ROR-DSE: ROR adequate test case generation using dynamic symbolic execution Journal-First Track Sangharatna Godboley NIT Warangal | ||
11:20 10mTalk | Reflective Unit Test Generation for Precise Type Error Detection with Large Language Models Research Papers Chen Yang Tianjin University, Ziqi Wang Tianjin University, Yanjie Jiang Peking University, Lin Yang Tianjin University, Yuteng Zheng Tianjin University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Junjie Chen Tianjin University | ||
11:30 10mTalk | FailMapper: Automated Generation of Unit Tests Guided by Failure Scenarios Research Papers ruiqi dong Swinburne University of Technology, Zehang Deng Swinburne University of Technology, Xiaogang Zhu The University of Adelaide, Xiaoning Du Monash University, Huai Liu Swinburne University of Technology, Shaohua Wang Central University of Finance and Economics, Sheng Wen Swinburne University of Technology, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology | ||
11:40 10mTalk | Advancing Code Coverage: Incorporating Program Analysis with Large Language Models Journal-First Track Chen Yang Tianjin University, Junjie Chen Tianjin University, Bin Lin Hangzhou Dianzi University, Ziqi Wang Tianjin University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd. | ||
11:50 10mTalk | Navigating the Labyrinth: Path-Sensitive Unit Test Generation with Large Language Models Research Papers Dianshu Liao the Australian National University, Xin Yin Zhejiang University, Shidong Pan Columbia University & New York University, Chao Ni Zhejiang University, Zhenchang Xing CSIRO's Data61, Xiaoyu Sun Australian National University, Australia Pre-print | ||
12:00 10mTalk | Enhancing LLM’s Ability to Generate More Repository-Aware Unit Tests Through Precise Context Injection Research Papers Xin Yin Zhejiang University, Chao Ni Zhejiang University, Xinrui Li School of Software Technology, Zhejiang University, Liushan Chen Douyin Co., Ltd., Guojun Ma Douyin Co., Ltd., Xiaohu Yang Zhejiang University Pre-print | ||
12:10 10mTalk | Toward Cost-Effective Adaptive Random Testing: An Approximate Nearest Neighbor Approach Journal-First Track Rubing Huang Macau University of Science and Technology (M.U.S.T.), Chenhui Cui Macau University of Science and Technology, Junlong Lian Jiangsu University, Haibo Chen Jiangsu University, Dave Towey University of Nottingham Ningbo China, Weifeng Sun | ||
12:20 10mTalk | Automated Combinatorial Test Generation for Alloy Research Papers Agustín Borda Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Germán Regis University of Rio Cuarto and CONICET, Nazareno Aguirre University of Rio Cuarto and CONICET, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto | ||
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Catering | ||
14:00 - 15:30 | |||
14:00 10mTalk | Incremental Program Analysis in the Wild: An Empirical Study on Real-World Program Changes Research Papers Xizao Wang Nanjing University, Xiangrong Bin Nanjing University, Lanxin Huang Nanjing University, Shangqing Liu Nanjing University, Jianhua Zhao Nanjing University, China, Lei Bu Nanjing University | ||
14:10 10mTalk | Spinner: Detecting Locking Violations in the eBPF Runtime Research Papers Priya Govindasamy University of California, Irvine, Joseph Bursey University of California, Irvine, Hsin-Wei Hung Meta, Ardalan Amiri Sani University of California, Irvine | ||
14:20 10mTalk | Towards More Accurate Static Analysis for Taint-style Bug Detection in Linux Kernel Research Papers Haonan Li University of California at Riverside, USA, Hang Zhang Indiana University, Kexin Pei The University of Chicago, Zhiyun Qian University of California at Riverside, USA Pre-print | ||
14:30 10mTalk | Automated Insertion of Flushes and Fences for Persistency Research Papers Yutong Guo University of California, Irvine, Weiyu Luo University of California, Irvine, Brian Demsky University of California at Irvine | ||
14:40 10mTalk | DIFFFIX: Incrementally Fixing AST Diffs via Context and Type Information Research Papers Guofeng Zeng University of Science and Technology Beijing, Chang-ai Sun University of Science and Technology Beijing, Kai Gao University of Science and Technology Beijing, Huai Liu Swinburne University of Technology | ||
14:50 10mTalk | Breaking the Traffic Barrier: Unveiling Multi-Format of Protocols via Autonomous Program Exploration Research Papers Dingzhao Xue Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Yibo Qu Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Bowen Jiang Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Xin Chen , Shuaizong Si Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
15:00 10mTalk | Loupe: End-to-End Learning of Loop Unrolling Heuristics for Abstract Interpretation Research Papers Maykel Mattar Université Paris-Saclay, CEA, List / Université Bretagne Sud, IRISA, Michele Alberti CEA, LIST, France, Valentin Perrelle CEA, LIST, France, Salah Sadou IRISA & CNRS, Universite Bretagne Sud,France | ||
15:10 10mTalk | Belief Propagation with Local Structure and Its Applications in Program Analysis Research Papers Yiqian Wu Peking University, China, Yifan Chen Peking University, Yingfei Xiong Peking University, Xin Zhang Peking University | ||
15:20 10mTalk | On the Correctness of Software Merge Research Papers Akira Mori National Institute of Advanced Industrial Science and Technology, Japan, Masatomo Hashimoto Chiba Institute of Technology, Japan | ||
14:00 - 15:30 | |||
14:00 10mTalk | Terminator: enabling efficient fuzzing of closed-source GUI programs by automatic coverage-guided termination Research Papers | ||
14:10 10mTalk | Function Clustering-Based Fuzzing Termination: Toward Smarter Early Stopping Research Papers ding liang University of Science and Technology of China, Wenzhang Yang Institute of AI for industries, Yinxing Xue Institute of AI for Industries, Chinese Academy of Sciences | ||
14:20 10mTalk | Risk Estimation in Differential Fuzzing via Extreme Value Theory Research Papers Rafael Baez University of Texas at El Paso, Alejandro Olivas University of Texas at El Paso, Nathan K Diamond University of Texas at El Paso, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Yannic Noller Ruhr University Bochum, Saeid Tizpaz-Niari University of Illinois Chicago | ||
14:30 10mTalk | Advanced White-Box Heuristics for Search-Based Fuzzing of REST APIs Journal-First Track Andrea Arcuri Kristiania University College and Oslo Metropolitan University, Man Zhang Beihang University, China, Juan Pablo Galeotti University of Buenos Aires | ||
14:40 10mTalk | BCFuzz: Bytecode-Driven Fuzzing for JavaScript Engines Research Papers Jiming Wang SKLP, Institute of Computing Technology, CAS & University of Chinese Academy of Sciences, Chenggang Wu Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Zhongguancun Laboratory, Jikai Ren SKLP, Institute of Computing Technology, CAS & University of Chinese Academy of Sciences, Yuhao Hu SKLP, Institute of Computing Technology, CAS & University of Chinese Academy of Sciences, Yan Kang Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiaojie Wei SKLP, Institute of Computing Technology, CAS, Yuanming Lai Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mengyao Xie SKLP, Institute of Computing Technology, CAS, Zhe Wang Institute of Computing Technology at Chinese Academy of Sciences; Zhongguancun Laboratory | ||
14:50 10mTalk | LSPFuzz: Hunting Bugs in Language Servers Research Papers Hengcheng Zhu The Hong Kong University of Science and Technology, Songqiang Chen The Hong Kong University of Science and Technology, Valerio Terragni University of Auckland, Lili Wei McGill University, Yepang Liu Southern University of Science and Technology, Jiarong Wu , Shing-Chi Cheung Hong Kong University of Science and Technology Pre-print | ||
15:00 10mTalk | TEPHRA: Principled Discovery of Fuzzer Limitations Research Papers Vasil Sarafov μCSRL, CODE Research Institute, University of the Bundeswehr Munich, David Markvica μCSRL, CODE Research Institute, University of the Bundeswehr Munich, Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
15:10 10mTalk | Learning-Guided Fuzzing for Testing Stateful SDN Controllers Journal-First Track Raphaël Ollando University of Luxembourg, Seung Yeob Shin University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland | ||
15:20 10mTalk | Learning from the Past: Real-World Exploit Migration for Smart Contract PoC Generation Research Papers Kairan Sun Nanyang Technological University, Zhengzi Xu Imperial Global Singapore, Kaixuan Li Nanyang Technological University, Lyuye Zhang Nanyang Technological University, Yebo Feng Nanyang Technological University, Daoyuan Wu Lingnan University, Yang Liu Nanyang Technological University | ||
14:00 - 15:30 | |||
14:00 10mTalk | Adaptive and accessible user interfaces for seniors through model-driven engineering Journal-First Track Shavindra Wickramathilaka Monash University, John Grundy Monash University, Kashumi Madampe Monash University, Australia, Omar Haggag Monash University, Australia Link to publication DOI | ||
14:10 10mTalk | AppBDS: LLM-Powered Description Synthesis for Sensitive Behaviors in Mobile Apps Research Papers | ||
14:20 10mTalk | Large Language Models for Automated Web-Form-Test Generation: An Empirical Study Journal-First Track Tao Li Macau University of Science and Technology, Chenhui Cui Macau University of Science and Technology, Rubing Huang Macau University of Science and Technology (M.U.S.T.), Dave Towey University of Nottingham Ningbo China, Lei Ma The University of Tokyo & University of Alberta | ||
14:30 10mTalk | Beyond Static GUI Agent: Evolving LLM-based GUI Testing via Dynamic Memory Research Papers Mengzhuo Chen Institute of Software, Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen TU Munich, Junjie Wang Institute of Software at Chinese Academy of Sciences, Yangguang Xue University of Chinese Academy of Sciences, Boyu Wu Institute of Software at Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Libin Wu Institute of Software Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences | ||
14:40 10mTalk | Who's to Blame? Rethinking the Brittleness of Automated Web GUI Testing from a Pragmatic Perspective Research Papers Haonan Zhang University of Waterloo, Kundi Yao University of Waterloo, Zishuo Ding The Hong Kong University of Science and Technology (Guangzhou), Lizhi Liao Memorial University of Newfoundland, Weiyi Shang University of Waterloo | ||
14:50 10mTalk | LLM-Cure: LLM-based Competitor User Review Analysis for Feature Enhancement Journal-First Track Maram Assi Université du Québec à Montréal, Safwat Hassan University of Toronto, Ying Zou Queen's University, Kingston, Ontario | ||
15:00 10mTalk | MIMIC: Integrating Diverse Personality Traits for Better Game Testing Using Large Language Model Research Papers Pre-print | ||
15:10 10mTalk | Debun: Detecting Bundled JavaScript Libraries on Web using Property-Order Graphs Research Papers Seojin Kim North Carolina State University, Sungmin Park Korea University, Jihyeok Park Korea University | ||
15:20 10mTalk | GUIFuzz++: Unleashing Grey-box Fuzzing on Desktop Graphical User Interfacing Applications Research Papers Pre-print | ||
14:00 - 15:30 | |||
14:00 10mTalk | Advancing Binary Code Similarity Detection via Context-Content Fusion and LLM Verification Research Papers Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Jingdong Guo Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Shouguo Yang Zhongguancun Laboratory, Beijing, China, Yi Li Nanyang Technological University, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Xiao Chinese Academy of Sciences, Yongle Chen Taiyuan University of Technology, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
14:10 10mTalk | ACTaint: Agent-Based Taint Analysis for Access Control Vulnerabilities in Smart Contracts Research Papers Huarui Lin Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Jiachi Chen Sun Yat-sen University, Xiang Chen Nantong University, Xiaohu Yang Zhejiang University, Lingfeng Bao Zhejiang University | ||
14:20 10mTalk | AMPLE: Fine-grained File Access Policies for Server Applications Research Papers | ||
14:30 10mTalk | Mockingbird: Efficient Excessive Data Exposures Detection via Dynamic Code Instrumentation Research Papers Chenxiao Xia Beijing Institute of Technology, Jiazheng Sun Fudan University, Jun Zheng Beijing Institute of Technology, Yu-an Tan Beijing Institute of Technology, Hongyi Su Beijing Institute of Technology | ||
14:40 10mTalk | DrainCode: Stealthy Energy Consumption Attacks on Retrieval-Augmented Code Generation via Context Poisoning Research Papers Jiadong Wu School of Software Engineering, Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Tianyue Jiang Sun Yat-sen University, Mingwei Liu Sun Yat-Sen University, Jiachi Chen Sun Yat-sen University, Chong Wang Nanyang Technological University, Ensheng Shi Huawei, Xilin Liu Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies, Hongyu Zhang Chongqing University, Zibin Zheng Sun Yat-sen University | ||
14:50 10mTalk | Finding Insecure State Dependency in DApps via Multi-Source Tracing and Semantic Enrichment Research Papers Jingwen Zhang School of Software Engineering, Sun Yat sen University, Yuhong Nan Sun Yat-sen University, Wei Li School of Software Engineering, Sun Yat sen University, Kaiwen Ning Sun Yat-sen University, Zewei Lin Sun Yat-sen University, Zitong Yao School of Software Engineering, Sun Yat sen University, Yuming Feng Peng Cheng Laboratory, Weizhe Zhang Harbin Institute of Technology, Zibin Zheng Sun Yat-sen University | ||
15:00 10mTalk | Better Safe than Sorry: Preventing Policy Violations through Predictive Root-Cause-Analysis for IoT Systems Research Papers Michael Norris Penn State University, Syed Rafiul Hussain Pennsylvania State University, Gang (Gary) Tan Pennsylvania State University | ||
15:10 10mTalk | Backdoors in Code Summarizers: How Bad Is It? Research Papers Chenyu Wang Singapore Management University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Yaniv Harel Tel Aviv University, David Lo Singapore Management University Pre-print | ||
15:20 10mTalk | ProfMal: Detecting Malicious NPM Packages by the Synergy between Static and Dynamic Analysis Research Papers Yiheng Huang Fudan University, Wen Zheng Fudan University, Susheng Wu Fudan University, Bihuan Chen Fudan University, You Lu Fudan University, Zhuotong Zhou Fudan University, Yiheng Cao Fudan University, Xiaoyu Li Fudan University, Xin Peng Fudan University | ||
14:00 - 15:30 | |||
14:00 10mTalk | LLMs for Automated Unit Test Generation and Assessment in Java: The AgoneTest Framework Research Papers Andrea Lops Polytechnic University of Bari, Italy, Fedelucio Narducci Polytechnic University of Bari, Azzurra Ragone University of Bari, Michelantonio Trizio Wideverse, Claudio Bartolini Wideverse s.r.l. | ||
14:10 10mTalk | µOpTime: Statically Reducing the Execution Time of Microbenchmark Suites Using Stability Metrics Journal-First Track Nils Japke TU Berlin & ECDF, Martin Grambow TU Berlin & ECDF, Christoph Laaber Simula Research Laboratory, David Bermbach TU Berlin | ||
14:20 10mTalk | Reference-Based Retrieval-Augmented Unit Test Generation Journal-First Track Zhe Zhang Beihang University, Liu Xingyu Beihang University, Yuanzhang Lin Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University, Yuan Yuan Beihang University | ||
14:30 10mTalk | Using Active Learning to Train Predictive Mutation Testing with Minimal Data Research Papers Miklos Borsi Karlsruhe Institute of Technology | ||
14:40 10mTalk | Clarifying Semantics of In-Context Examples for Unit Test Generation Research Papers Chen Yang Tianjin University, Lin Yang Tianjin University, Ziqi Wang Tianjin University, Dong Wang Tianjin University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Junjie Chen Tianjin University | ||
14:50 10mTalk | An empirical study of test case prioritization on the Linux Kernel Journal-First Track Haichi Wang College of Intelligence and Computing, Tianjin University, Ruiguo Yu College of Intelligence and Computing, Tianjin University, Dong Wang Tianjin University, Yiheng Du College of Intelligence and Computing, Tianjin University, Yingquan Zhao Tianjin University, Junjie Chen Tianjin University, Zan Wang Tianjin University | ||
15:00 10mTalk | Automated Generation of Issue-Reproducing Tests by Combining LLMs and Search-Based Testing Research Papers Konstantinos Kitsios University of Zurich, Marco Castelluccio Mozilla, Alberto Bacchelli University of Zurich Pre-print | ||
15:10 10mTalk | Using Fourier Analysis and Mutant Clustering to Accelerate DNN Mutation Testing Research Papers | ||
15:20 10mTalk | WEST: Specification-Based Test Generation for WebAssembly Research Papers | ||
15:00 - 18:00 | |||
15:00 3hDemonstration | DSBox: A Data Selection Framework for Efficient Deep Code Learning Tool Demonstration Track | ||
15:00 3hDemonstration | OSSPREY: AI-Driven Forecasting and Intervention for OSS Project Sustainability Tool Demonstration Track Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis, Priyal Soni University of California, Davis, Arjun Ashok University of California, Davis, Vladimir Filkov University of California at Davis, USA | ||
15:00 3hDemonstration | ORMorpher: An Interactive Framework for ORM Translation and Optimization Tool Demonstration Track Milan Abrahám Department of Software Engineering, Charles University, Pavel Koupil Charles University, Faculty of Mathematics and Physics | ||
15:00 3hDemonstration | PrioTestCI: Efficient Test Case Prioritization in GitHub Workflows for CI Optimization Tool Demonstration Track Shubham Vasudeo Desai North Carolina State University, Shonil Bhide North Carolina State University, Souhaila Serbout University of Zurich, Zurich, Switzerland, Luciano Marchezan DIRO, University of Montreal, Wesley Assunção North Carolina State University | ||
15:00 3hDemonstration | CLARA: A Developer’s Companion for Code Comprehension and Analysis Tool Demonstration Track Ahmed Adnan , Mushfiqur Rahman Bangladesh University of Business and Technology, saad sakib noor University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka | ||
15:00 3hDemonstration | CodeGenLink: A Tool to Find the Likely Origin and License of Automatically Generated Code Tool Demonstration Track Daniele Bifolco University of Sannio, Guido Annicchiarico University of Sannio, Italy, Pierluigi Barbiero University of Sannio, Italy, Massimiliano Di Penta University of Sannio, Italy, Fiorella Zampetti University of Sannio, Italy Pre-print Media Attached | ||
15:00 3hDemonstration | A Large-Scale Evolvable Dataset for Model Context Protocol Ecosystem and Security Analysis Tool Demonstration Track Zhiwei Lin National University of Singapore, Bonan Ruan National University of Singapore, Jiahao Liu National University of Singapore, Weibo Zhao National University of Singapore | ||
15:00 3hDemonstration | Evaluating Program Coverage for Code-Model Training Tool Demonstration Track | ||
15:00 3hDemonstration | BuilDroid: A Self-Correcting LLM Agent for Automated Android Builds Tool Demonstration Track Jaehyeon Kim New York University Abu Dhabi, Rui Rua New York University Abu Dhabi, Karim Ali NYU Abu Dhabi | ||
15:00 3hDemonstration | LitterBox+: An Extensible Framework for LLM-enhanced Scratch Static Code Analysis Tool Demonstration Track Benedikt Fein University of Passau, Florian Obermueller University of Passau, Gordon Fraser University of Passau Pre-print | ||
15:00 3hDemonstration | PyGress: Tool for Analyzing Progression of Code Proficiency in Python OSS Projects Tool Demonstration Track Rujiphart Charatvaraphan Faculty of Information and Communication Technology, Mahidol University, Bunradar Chatchaiyadech Faculty of Information and Communication Technology, Mahidol University, Thitirat Sukijprasert Faculty of Information and Communication Technology, Mahidol University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Morakot Choetkiertikul Mahidol University, Thailand, Raula Gaikovina Kula The University of Osaka, Thanwadee Sunetnanta Mahidol University, Kenichi Matsumoto Nara Institute of Science and Technology | ||
15:00 3hDemonstration | PyTrim: A Practical Tool for Reducing Python Dependency Bloat Tool Demonstration Track Konstantinos Karakatsanis Athens University of Economics and Business, Georgios Alexopoulos University of Athens, Ioannis Karyotakis Athens University of Economics and Business, Foivos Timotheos Proestakis Athens University of Economics and Business, Evangelos Talos Athens University of Economics and Business, Panos Louridas Athens University of Economics and Business, Dimitris Mitropoulos University of Athens | ||
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Catering | ||
16:00 - 17:00 | |||
16:00 10mTalk | Minuku: Detecting Diverse Display Issues in Mobile Apps with Small-scale Dataset Industry Showcase Yongxiang Hu Fudan University, Ke Liu College of Computer Science and Artificial Intelligence, Fudan University, Hailiang Jin Meituan Inc., Shiyu Guo Meituan, Juxing Yuan Meituan Inc., Xin Wang Fudan University, Yangfan Zhou Fudan University | ||
16:10 10mTalk | HarmoBridge: Bridging ArkTS and C/C++ for Cross-Language Static Analysis on HarmonyOS Industry Showcase Jiale Wu Huazhong University of Science and Technology, Jiapeng Deng Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Li Li Beihang University, Haoyu Wang Huazhong University of Science and Technology | ||
16:20 10mTalk | From Redundancy to Efficiency: Exploiting Shared UI Interactions towards Efficient LLM-Based Testing Industry Showcase Xuan Wang Fudan University, Yingchuan Wang School of Computer Science, Fudan University, Yongxiang Hu Fudan University, Yu Zhang Meituan, Hailiang Jin Meituan Inc., Shiyu Guo Meituan, Juxing Yuan Meituan Inc., Yangfan Zhou Fudan University | ||
16:30 10mTalk | Securing Millions of Decentralized Identities in Alipay Super App with End-to-End Formal Verification Industry Showcase Ziyu Mao Zhejiang University, Xiaolin Ma Zhejiang University, Lin Huang Ant Group, Huan Yang Ant Group, Wu Zhang Ant Group, Weichao Sun Ant Group, Yongtao Wang Ant Group, Jingling Xue University of New South Wales, Jingyi Wang Zhejiang University | ||
16:40 10mTalk | LLM-based Dynamic Differential Testing for Database Connectors with Reinforcement Learning-Guided Prompt Selection NIER Track Ce Lyu East China Normal University, Yanhao Wang East China Normal University, Jie Liang Beihang University, Minghao Zhao East China Normal University | ||
16:50 10mTalk | LLM-assisted Industrial-Scale Differential Testing of Package Incompatibilities in Linux Distributions Industry Showcase Yuhao Yang Central South University, Chijin Zhou East China Normal University, Runzhe Wang Alibaba Group, Weibo Zhang Central South University, Yuheng Shen Tsinghua University, Xiaohai Shi Alibaba Group, Tao Ma Alibaba Group, Chang Gao Alibaba Group, Zhe Wang Institute of Computing Technology at Chinese Academy of Sciences; Zhongguancun Laboratory, Ying Fu Tsinghua University, Heyuan Shi Central South University | ||
16:00 - 17:00 | |||
16:00 10mTalk | RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps NIER Track Tiezhu Sun University of Luxembourg, Marco Alecci University of Luxembourg, Yewei Song University of Luxembourg, Xunzhu Tang University of Luxembourg, Kisub Kim DGIST, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg | ||
16:10 10mTalk | Unlocking Reproducibility: Automating re-Build Process for Open-Source Software Industry Showcase Behnaz Hassanshahi Oracle, Trong Nhan Mai Oracle Labs, Benjamin Selwyn-Smith Oracle Labs, Nicholas Allen Oracle | ||
16:20 10mTalk | JSidentify-V2: Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection Industry Showcase Zhihao Li Tencent Inc., Chaozheng Wang The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Xinyong Peng Tencent Inc., Qun Xia Tencent Inc., Haochuan Lu Tencent, Ting Xiong Tencent Inc., Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Shuai Wang Hong Kong University of Science and Technology, Yuetang Deng Tencent, Huafeng Ma Tencent Inc. | ||
16:30 10mTalk | IDBFuzz: Web Storage DataBase Fuzzing with Controllable Semantics NIER Track Jingyi Chen Jiangsu University, Jinfu Chen Jiangsu University, Saihua Cai Jiangsu University, Shengran Wang Jiangsu University | ||
16:40 10mTalk | SCOPE: Evaluating and Enhancing Permission Explanation Transparency in Mobile Apps Industry Showcase Liu Wang Beijing University of Posts and Telecommunications, Tianshu Zhou Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, Xiyuan Liu Freshippo-Alibaba Group, Yi Wang | ||
16:50 10mTalk | ApkArmor: Low-Cost Lightweight Anti-Decompilation Techniques for Android Apps Industry Showcase Jiayang Liu Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Pengcheng Xia Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
16:00 - 17:00 | |||
16:00 10mTalk | The Gold Digger in the Dark Forest: Industrial-Scale MEV Analysis in Ethereum Industry Showcase Ningyu He Hong Kong Polytechnic University, Tianyang Chi Beijing University of Posts and Telecommunications, Xiaohui Hu Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
16:10 10mTalk | RPG: Linux Kernel Fuzzing Guided by Distribution-Specific Runtime Parameter Interfaces Industry Showcase Yuhan Chen Central South Sniversity, Yuheng Shen Tsinghua University, Guoyu Yin Central South University, Fan Ding Central South Sniversity, Runzhe Wang Alibaba Group, Tao Ma Alibaba Group, Xiaohai Shi Alibaba Group, Qiang Fu Central South University, Ying Fu Tsinghua University, Heyuan Shi Central South University | ||
16:20 10mTalk | Securing Self-Managed Third-Party Libraries Industry Showcase Xin Zhou Nanjing University, Jinwei Xu Nanjing University, He Zhang Nanjing University, Yanjing Yang Nanjing University, Lanxin Yang Nanjing University, Bohan Liu Nanjing University, Hongshan Tang JD.com, Inc. | ||
16:30 10mTalk | STaint: Detecting Second-Order Vulnerabilities in PHP Applications with LLM-Assisted Bi-Directional Static Taint Analysis NIER Track Yuchen Ji ShanghaiTech University, Hongchen Cao ShanghaiTech University, Jingzhu He ShanghaiTech University | ||
16:40 10mTalk | AdaptiveGuard: Towards Adaptive Runtime Safety for LLM-Powered Software Industry Showcase Rui Yang Monash University and Transurban, Michael Fu The University of Melbourne, Kla Tantithamthavorn Monash University and Atlassian, Chetan Arora Monash University, Gunel Gulmammadova Transurban, Joey Chua Transurban | ||
16:50 10mTalk | CONFUSETAINT: Exploiting Vulnerabilities to Bypass Dynamic Taint Analysis NIER Track | ||
Thu 20 NovDisplayed time zone: Seoul change
Thu 20 Nov
Displayed time zone: Seoul change
08:30 - 10:00 | |||
09:00 15mDay opening | Opening Doctoral Symposium | ||
09:15 45mTalk | Which Path Should I Take? Navigating Your Journey to a PhD Doctoral Symposium Jürgen Cito TU Wien | ||
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering | ||
10:30 - 12:30 | |||
10:30 45mTalk | Human-Centered Evaluation of REST API Fuzzing Tools: Bridging Academia and Industry Doctoral Symposium Fanny Febriani Susilo Kristiania University of Applied Sciences | ||
11:15 45mTalk | Testing Autonomous Driving Systems Through Blind-Spot Guided Fuzzing Doctoral Symposium Sali Moussa Chang'an University | ||
12:00 30mOther | Ask us anything Doctoral Symposium | ||
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Catering | ||
14:00 - 15:30 | |||
14:00 45mTalk | Beyond the Paper: Publishing, Artifacts, and Collaboration in Today's Research Ecosystem Doctoral Symposium Eric Bodden Heinz Nixdorf Institute at Paderborn University; Fraunhofer IEM | ||
14:45 45mTalk | Detecting and Mitigating Inconsistencies Between Code, Documentation and Tests Doctoral Symposium Tobias Kiecker Humboldt-Universität zu Berlin | ||
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Catering | ||
16:00 - 18:00 | |||
16:00 45mTalk | Secure Transaction Semantics: Analysis, Vulnerability Detection, and Attack Modeling Doctoral Symposium Yixuan Liu Nanyang Technological University | ||
16:45 45mTalk | Improving Quality of LLM Code Generation in Low-Resource Programming Languages via Uncertainty Estimation Doctoral Symposium Georgii Andriushchenko Innopolis University | ||
17:30 15mDay closing | Closing Doctoral Symposium | ||