ECOOP and ISSTA 2023 (series) /
ECOOP and ISSTA 2023 Program
Filter Program
Dates
Rooms
Tracks
Badges
Your Program
Mon 17 JulDisplayed time zone: Pacific Time (US & Canada) change
Mon 17 Jul
Displayed time zone: Pacific Time (US & Canada) change
08:00 - 08:30 | |||
08:00 30mCoffee break | Break Catering |
08:30 - 10:00 | |||
09:00 15mDay opening | Welcome and Introductions FUZZING | ||
09:15 45mKeynote | Three Colours of Fuzzing: Reflections and Open Challenges FUZZING |
08:30 - 10:00 | |||
08:30 15mDay opening | Welcome DEBT | ||
08:45 75mKeynote | Language-Based Debugging DEBT Andreas Zeller CISPA Helmholtz Center for Information Security Pre-print |
08:30 - 10:00 | Session 1COP at Habib Classroom (Gates G01) Chair(s): Lars Schütze Technische Universität Dresden, Yudai Tanabe Kyoto University | ||
08:50 10mDay opening | Opening COP | ||
09:00 30mTalk | Temporal Layers: Reactive Activation Scope of First-class Layer Instances COP Tetsuo Kamina Oita University Link to publication DOI | ||
09:30 30mTalk | Towards Virtual Machine Support for Contextual Role-Oriented Programming Languages COP Link to publication DOI |
08:30 - 10:00 | |||
08:30 5mKeynote | Introduction and welcome to the Doctoral Symposium Doctoral Symposium | ||
08:35 60mKeynote | How to get your Ph.D. DONE! Doctoral Symposium |
08:30 - 10:00 | Session 1ICOOOLPS at Smith Classroom (Gates G10) Chair(s): Dimi Racordon Northeastern University, USA | ||
08:45 15mCoffee break | Welcome and Introduction ICOOOLPS Dimi Racordon Northeastern University, USA | ||
09:00 60mTalk | Deegen: a meta-compiler approach for high performance VMs at low engineering cost ICOOOLPS Haoran Xu Stanford University |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering |
10:30 - 12:00 | |||
10:30 60mPanel | Fishbowl Conversation FUZZING | ||
11:30 30mTalk | Reflections on preregistration-based publication model FUZZING |
10:30 - 12:00 | |||
10:30 30mTalk | Using Object-Sequence Diagrams for Debugging DEBT Ole Lehrmann Madsen Aarhus University Link to publication | ||
11:00 30mTalk | Debugging Video Games: A Systematic Mapping DEBT Adrien Vanègue Inria, Valentin Bourcier INRIA, Fabio Petrillo École de technologie supérieure (ÉTS), Montréal -- Université du Québec, Steven Costiou INRIA Lille Link to publication | ||
11:30 30mKeynote | Searching for Justice in Programming Language Design DEBT Amy Ko University of Washington |
10:30 - 12:00 | |||
10:30 8mTalk | Automatic Testing and Benchmarking for Configurable Static Analysis Tools Doctoral Symposium S: Austin Mordahl University of Texas at Dallas, P: Owolabi Legunsen Cornell University, P: Tevfik Bultan University of California at Santa Barbara | ||
10:38 5mTalk | Optimizing Continuous Development and Predicting Test Information in Software Development Doctoral Symposium talank baral , P: Owolabi Legunsen Cornell University, P: Tevfik Bultan University of California at Santa Barbara | ||
10:43 8mTalk | Sparse Symbolic Execution Doctoral Symposium S: Frank Busse Imperial College London, P: Owolabi Legunsen Cornell University, P: Tevfik Bultan University of California at Santa Barbara | ||
10:51 5mTalk | Understanding and Improving the Adoption of Large Language Models Doctoral Symposium S: Suzzana Rafi , P: Owolabi Legunsen Cornell University, P: Tevfik Bultan University of California at Santa Barbara |
10:30 - 12:00 | |||
10:30 30mTalk | Towards Reliable Memory Management for Python Native Extensions ICOOOLPS Joannah Nanjekye University of New Brunswick, David Bremner University of New Brunswick, Aleksandar Micic IBM, Canada Pre-print |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
13:30 - 15:00 | |||
13:30 45mKeynote | Rich coverage signal and the consequences for scaling FUZZING | ||
14:15 15mPaper | Large Language Models for Fuzzing Parsers FUZZING | ||
14:30 15mPaper | Novelty not Found: Adaptive Fuzzer Restarts to Improve Input Space Coverage FUZZING Nico Schiller CISPA Helmholtz Center for Information Security, Xinyi Xu CISPA Helmholtz Center for Information Security, Lukas Bernhard CISPA Helmholtz Center for Information Security, Nils Bars CISPA Helmholtz Center for Information Security, Moritz Schloegel CISPA, Germany, Thorsten Holz CISPA Helmholtz Center for Information Security | ||
14:45 15mPaper | Grammar Mutation for Testing Input Parsers FUZZING Bachir Bendrissou Imperial College London, Cristian Cadar Imperial College London, Alastair F. Donaldson Imperial College London |
13:30 - 15:00 | |||
13:30 30mTalk | Symbolic Debugging with Gillian DEBT Nat Karmios Imperial College London, Sacha-Élie Ayoun Imperial College London, Philippa Gardner Imperial College London DOI | ||
14:00 30mTalk | Demo: Debugging Constraint Devices with EDWARD DEBT Tom Lauwaerts Universiteit Gent, Belgium, Carlos Rojas Castillo Vrije Universiteit Brussel, Christophe Scholliers Universiteit Gent, Belgium, Elisa Gonzalez Boix Vrije Universiteit Brussel Link to publication | ||
14:30 30mTalk | Program State Visualizer with User-Defined Representation Conversion DEBT Rifqi Adlan Apriyadi Tokyo Institute of Technology, Hidehiko Masuhara Tokyo Institute of Technology, Youyou Cong Tokyo Institute of Technology Link to publication |
13:30 - 15:00 | |||
13:30 8mTalk | Quantitative Robustness Analysis of Neural Networks Doctoral Symposium S: Mara Downing University of California, Santa Barbara, P: Wing Lam George Mason University, P: Xusheng Xiao Case Western Reserve University, P: Jonathan Aldrich Carnegie Mellon University | ||
13:38 8mTalk | Harnessing Large Language Models for Simulink Toolchain Testing and Developing Diverse Open-Source Corpora of Simulink Doctoral Symposium S: Sohil Lal Shrestha The University of Texas at Arlington, P: Wing Lam University of Illinois at Urbana-Champaign, P: Xusheng Xiao Arizona State University, P: Jonathan Aldrich Carnegie Mellon University Link to publication DOI | ||
13:46 5mTalk | Fairness Testing For Recommender Systems Doctoral Symposium S: Huizhong Xiao , P: Wing Lam George Mason University, P: Xusheng Xiao Case Western Reserve University, P: Jonathan Aldrich Carnegie Mellon University | ||
13:51 10mTalk | General advice for your PhD career Doctoral Symposium | ||
14:01 25mTalk | Planning your dissertation topic Doctoral Symposium |
13:30 - 15:00 | |||
13:30 60mTalk | A Retrospective on Julia ICOOOLPS Benjamin Chung Northeastern University | ||
14:30 30mResearch paper | Lazy Code Transformations in a Formally Verified Compiler ICOOOLPS Pre-print |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break Catering |
15:30 - 17:00 | |||
15:30 15mPaper | CrabSandwich: Fuzzing Rust with Rust FUZZING Addison Crump CISPA Helmholtz Center for Information Security, Dongjia Zhang EURECOM, Syeda Mahnur Asif CISPA Helmholtz Center for Information Security, Dominik Maier TU Berlin, Andrea Fioraldi EURECOM, Thorsten Holz CISPA Helmholtz Center for Information Security, Davide Balzarotti EURECOM | ||
15:45 15mPaper | Beyond The Coverage Plateau - A Comprehensive Study of Fuzz Blockers FUZZING Wentao Gao , Thuan Pham The University of Melbourne, Dongge Liu , Oliver Chang Google, Toby Murray University of Melbourne, Benjamin I.P. Rubinstein University of Melbourne | ||
16:00 15mPaper | DiPri: Distance-based Seed Prioritization for Greybox Fuzzing FUZZING Ruixiang Qian State Key Laboratory for Novel Software Technology, Nanjing University, Quanjun Zhang Nanjing University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University | ||
16:15 15mPaper | InFuzz: An Interactive Tool for Enhancing Efficiency in Fuzzing through Visual Bottleneck Analysis FUZZING Qian Yan National Key Laboratory of Science and Technology on Information System Security, Minhuan Huang National Key Laboratory of Science and Technology on Information System Security, Huayang Cao National Key Laboratory of Science and Technology on Information System Security, Shuaibing Lu Academy of Military Sciences | ||
16:30 15mPaper | Multi-phase Parallel Fuzzer FUZZING Taotao Gu Academy of Military Sciences, Tong Wang National Key Laboratory of Science and Technology on Information System Security, Xiang Li Academy of Military Sciences, Shuaibing Lu Academy of Military Sciences, Yuanping Nie Academy of Military Sciences, Zhaowei Zhang National Key Laboratory of Science and Technology on Information System Security, Xiaohui Kuang Academy of Military Sciences, Gang Zhao National Key Laboratory of Science and Technology on Information System Security | ||
16:45 15mDay closing | Concluding Remarks FUZZING |
15:30 - 17:00 | |||
15:30 60mDay closing | Discussion DEBT |
15:30 - 17:00 | |||
15:30 5mTalk | Reasoning About MLIR Semantics Through Algebraic Effects and Handlers Doctoral Symposium S: Pingshi Yu Imperial College London, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Xusheng Xiao Case Western Reserve University, P: Emery Berger | ||
15:35 5mTalk | Quantitative Symbolic Similarity Analysis Doctoral Symposium S: Laboni Sarker University of California at Santa Barbara, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Xusheng Xiao Arizona State University, P: Emery Berger | ||
15:40 8mTalk | Type Automata Doctoral Symposium S: Ori Roth Technion, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Xusheng Xiao Case Western Reserve University, P: Emery D. Berger University of Massachusetts Amherst | ||
15:48 25mTalk | How to conduct impactful research Doctoral Symposium |
15:30 - 17:00 | |||
15:30 45mPanel | Round table ICOOOLPS Dimi Racordon Northeastern University, USA |
Tue 18 JulDisplayed time zone: Pacific Time (US & Canada) change
Tue 18 Jul
Displayed time zone: Pacific Time (US & Canada) change
08:00 - 08:30 | |||
08:00 30mCoffee break | Break Catering |
08:30 - 09:00 | |||
09:00 - 10:00 | |||
09:00 60mKeynote | Towards Code-Aware Code Models Keynotes |
09:00 - 10:00 | |||
09:00 60mKeynote | State of state in Dafny FTfJP K. Rustan M. Leino Amazon |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering |
10:30 - 12:00 | ISSTA 1: Program Repair and DebuggingISSTA Technical Papers at Amazon Auditorium (Gates G20) Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
10:30 15mTalk | Improving Spectrum-Based Localization of Multiple Faults by Iterative Test Suite Reduction ISSTA Technical Papers DOI | ||
10:45 15mTalk | A Bayesian Framework for Automated Debugging ISSTA Technical Papers DOI Pre-print | ||
11:00 15mTalk | ConfFix: Repairing Configuration Compatibility Issues in Android Apps ISSTA Technical Papers Huaxun Huang Hong Kong University of Science and Technology, Chi Xu The Hong Kong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology DOI | ||
11:15 15mTalk | Quantitative Policy Repair for Access Control on the Cloud ISSTA Technical Papers William Eiers University of California at Santa Barbara, Ganesh Sankaran University of California at Santa Barbara, Tevfik Bultan University of California at Santa Barbara DOI | ||
11:30 15mTalk | Automated Program Repair from Fuzzing Perspective ISSTA Technical Papers YoungJae Kim Ulsan National Institute of Science and Technology, Seungheon Han Ulsan National Institute of Science and Technology, Askar Yeltayuly Khamit Ulsan National Institute of Science and Technology, Jooyong Yi UNIST (Ulsan National Institute of Science and Technology) DOI |
10:30 - 12:00 | |||
10:30 25mTalk | Verifying C++ dynamic binding FTfJP Link to publication DOI Pre-print | ||
10:55 15mTalk | Correctness-by-Construction meets Refinement Types FTfJP Baber Rehman University of Hong Kong | ||
11:10 25mTalk | Towards Verified Scalable Parallel Computing with Coq and Spark FTfJP DOI | ||
11:35 25mTalk | Constructing Structured SSA from FJ FTfJP Kenny Zhuo Ming Lu ISTD, Singapore University of Technology and Design, Daniel Yu Hian Low Singapore University of Technology and Design |
10:30 - 12:00 | |||
10:30 20mTalk | Runtime Monitoring of Human Behaviour with Aggregate Computing on Android VORTEX Media Attached | ||
10:50 20mTalk | On Stream Runtime Verification and Aggregate Programming VORTEX Ferruccio Damiani University of Turin, Gianluca Torta Dipartimento di Informatica - Università di Torino, Italy | ||
11:10 20mTalk | Combining Static and Runtime Verification with AC and Coq VORTEX |
10:30 - 12:00 | ISSTA 2: Fuzzing 1ISSTA Technical Papers at Smith Classroom (Gates G10) Chair(s): Jonathan Bell Northeastern University | ||
10:30 15mTalk | Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing ISSTA Technical Papers Michael Chesser University of Adelaide, Surya Nepal CSIRO’s Data61, Damith C. Ranasinghe University of Adelaide DOI | ||
10:45 15mTalk | Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction ISSTA Technical Papers Stephan Lipp TU Munich, Daniel Elsner TU Munich, Severin Kacianka TU Munich, Alexander Pretschner TU Munich, Marcel Böhme MPI-SP; Monash University, Sebastian Banescu TU Munich DOI | ||
11:00 15mTalk | ItyFuzz: Snapshot-Based Fuzzer for Smart Contract ISSTA Technical Papers Chaofan Shou University of California at Santa Barbara, Shangyin Tan University of California at Berkeley, Koushik Sen University of California at Berkeley DOI | ||
11:15 15mTalk | Large Language Models Are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models ISSTA Technical Papers Yinlin Deng University of Illinois at Urbana-Champaign, Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Haoran Peng University of Science and Technology of China, Chenyuan Yang University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
11:30 15mTalk | Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing ISSTA Technical Papers Mingxi Ye Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Dongpeng Wu Sun Yat-sen University, Huizhong Li WeBank DOI | ||
11:45 15mTalk | Green Fuzzer Benchmarking ISSTA Technical Papers DOI |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
13:30 - 15:00 | ISSTA 3: Deep-Learning for Software AnalysisISSTA Technical Papers at Amazon Auditorium (Gates G20) Chair(s): Shiyi Wei University of Texas at Dallas | ||
13:30 15mTalk | API2Vec: Learning Representations of API Sequences for Malware Detection ISSTA Technical Papers Lei Cui Zhongguancun Laboratory, Jiancong Cui University of Chinese Academy of Sciences; Institute of Information Engineering at Chinese Academy of Sciences, Yuede Ji University of North Texas, Zhiyu Hao Zhongguancun Laboratory, Lun Li Institute of Information Engineering at Chinese Academy of Sciences, Zhenquan Ding Institute of Information Engineering at Chinese Academy of Sciences DOI | ||
13:45 15mTalk | CONCORD: Clone-Aware Contrastive Learning for Source CodeACM SIGSOFT Distinguished Paper ISSTA Technical Papers Yangruibo Ding Columbia University, Saikat Chakraborty Microsoft Research, Luca Buratti IBM Research, Saurabh Pujar IBM, Alessandro Morari IBM Research, Gail Kaiser Columbia University, Baishakhi Ray Columbia University DOI | ||
14:00 15mTalk | Type Batched Program Reduction ISSTA Technical Papers DOI | ||
14:15 15mTalk | CodeGrid: A Grid Representation of Code ISSTA Technical Papers Abdoul Kader Kaboré University of Luxembourg, Earl T. Barr University College London; Google DeepMind, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg DOI | ||
14:30 15mTalk | Guided Retraining to Enhance the Detection of Difficult Android Malware ISSTA Technical Papers Nadia Daoudi University of Luxembourg, Kevin Allix CentraleSupélec, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg DOI | ||
14:45 15mTalk | Automatically Reproducing Android Bug Reports using Natural Language Processing and Reinforcement Learning ISSTA Technical Papers Zhaoxu Zhang University of Southern California, Robert Winn University of Southern California, Yu Zhao University of Central Missouri, Tingting Yu University of Cincinnati, William G.J. Halfond University of Southern California DOI |
13:30 - 15:00 | |||
13:30 25mTalk | Gradual Guarantee for FJ with lambda-expressions FTfJP Pedro Ângelo University of Porto, Viviana Bono University of Torino, Mariangiola Dezani Università di Torino, Mário Florido Universidade do Porto | ||
13:55 25mTalk | Points-to Analysis for Context-Oriented JavaScript Programs FTfJP Sergio Cardenas Universidad de los Andes, Paul Leger Universidad Católica del Norte, Chile, Hiroaki Fukuda Shibaura Institute of Technology, Nicolás Cardozo Universidad de los Andes DOI Media Attached | ||
14:20 25mTalk | Dependency-free Capture Tracking FTfJP Edward Lee University of Waterloo, Kavin Satheeskumar University of Waterloo, Ondřej Lhoták University of Waterloo |
13:30 - 15:00 | Tool Demo PresentationsISSTA Tool Demonstrations at Habib Classroom (Gates G01) Chair(s): Jonathan Bell Northeastern University, Luís Pina University of Illinois at Chicago | ||
13:30 6mTalk | DDLDroid: A Static Analyzer for Automatically Detecting Data Loss Issues in Android Applications ISSTA Tool Demonstrations Yuhao Zhou Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology Link to publication DOI Media Attached | ||
13:36 6mTalk | EvoSpex: A Search-based Tool for Postcondition Inference ISSTA Tool Demonstrations Facundo Molina IMDEA Software Institute, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires Media Attached | ||
13:42 6mTalk | ECSTATIC: Automatic Configuration-Aware Testing and Debugging of Static Analysis Tools ISSTA Tool Demonstrations Austin Mordahl University of Texas at Dallas, Dakota Soles The University of Texas at Dallas, Miao Miao The University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas | ||
13:49 6mTalk | KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and Optimization ISSTA Tool Demonstrations Qinglong Wang Alibaba Group, Runzhe Wang Alibaba Group, Yuxi Hu Alibaba Group, Xiaohai Shi Alibaba Group, Zheng Liu Alibaba Group; Zhejiang University, Tao Ma Alibaba Group, Houbing Song University of Maryland, Baltimore County, Heyuan Shi Central South University | ||
13:55 6mTalk | EDHOC-Fuzzer: An EDHOC Protocol State Fuzzer ISSTA Tool Demonstrations Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens, Thanasis Typaldos National Technical University of Athens DOI Pre-print | ||
14:02 6mTalk | KDAlloc: The KLEE Deterministic Allocator ISSTA Tool Demonstrations Daniel Schemmel Imperial College London, Julian Büning RWTH Aachen University, Frank Busse Imperial College London, Martin Nowack Imperial College London, Cristian Cadar Imperial College London | ||
14:08 6mTalk | RustSmith: Random Differential Compiler Testing for Rust ISSTA Tool Demonstrations Mayank Sharma Imperial College London, Pingshi Yu Imperial College London, Alastair F. Donaldson Imperial College London | ||
14:15 6mTalk | SymRustC: A Hybrid Fuzzer for Rust ISSTA Tool Demonstrations Frédéric Tuong Simon Fraser University, Mohammad Omidvar Tehrani Simon Fraser University, Marco Gaboardi Boston University, Steve Ko Simon Fraser University | ||
14:21 6mTalk | TreeLine and SlackLine: Grammar-Based Performance Fuzzing on Coffee Break ISSTA Tool Demonstrations | ||
14:27 6mTalk | MetaData262: Automatic Test Suite Selection for Partial JavaScript Implementations ISSTA Tool Demonstrations Frederico Ramos Instituto Superior Técnico, Diogo Costa Reis Instituto Superior Técnico, Miguel Trigo Instituto Superior Técnico, António Morgado INESC-ID, José Fragoso Santos INESC-ID/Instituto Superior Técnico, Portugal | ||
14:34 6mTalk | PExReport-Maven: Creating Pruned Executable Cross-Project Failure Reports in Maven Build System ISSTA Tool Demonstrations Media Attached | ||
14:40 6mTalk | RobotBT: Behavior-Tree-Based Test-Case Specification for the Robot Framework ISSTA Tool Demonstrations Sven Peldszus Ruhr University Bochum, Noubar Akopian Ruhr University Bochum, Thorsten Berger Ruhr University Bochum DOI Media Attached | ||
14:47 6mTalk | Behaviorally Typed State Machines in TypeScript for Heterogeneous Swarms ISSTA Tool Demonstrations | ||
14:53 6mTalk | Oven: Safe and Live Communication Protocols in Scala, using Synthetic Behavioural Type Analysis ISSTA Tool Demonstrations Francisco Ferreira Royal Holloway, University of London, Sung-Shik Jongmans Open University of the Netherlands; CWI |
13:30 - 15:00 | |||
13:30 30mTalk | RV4Rasa: a formalism-agnostic Runtime Verification framework for verifying ChatBots in Rasa VORTEX Angelo Ferrando , Andrea Gatti University of Genoa, Italy, Viviana Mascardi DIBRIS, University of Genova, Italy | ||
14:00 20mTalk | Monitoring for resource-awareness VORTEX Riccardo Bianchini University of Genoa |
13:30 - 15:00 | ISSTA 4: Static AnalysisISSTA Technical Papers at Smith Classroom (Gates G10) Chair(s): Christian Hammer University of Passau | ||
13:30 15mTalk | Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis ISSTA Technical Papers Kai Cheng Shenzhen Institute of Advanced Technology at Chinese Academy of Sciences; Sangfor Technologies, Yaowen Zheng Nanyang Technological University, Tao Liu Pennsylvania State University, Le Guan University of Georgia, Peng Liu Pennsylvania State University, Hong Li Institute of Information Engineering at Chinese Academy of Sciences, Hongsong Zhu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kejiang Ye Shenzhen Institute of Advanced Technology at Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
13:45 15mTalk | Beware of the Unexpected: Bimodal Taint AnalysisACM SIGSOFT Distinguished Paper ISSTA Technical Papers DOI | ||
14:00 15mTalk | OCFI: Make Function Entry Identification Hard Again ISSTA Technical Papers Chengbin Pang Nanjing University, Tiantai Zhang Nanjing University, Xuelan Xu Nanjing University, Linzhang Wang Nanjing University, Bing Mao Nanjing University DOI | ||
14:15 15mTalk | Tai-e: A Developer-Friendly Static Analysis Framework for Java by Harnessing the Good Designs of Classics ISSTA Technical Papers DOI Pre-print | ||
14:30 15mTalk | That’s a Tough Call: Studying the Challenges of Call Graph Construction for WebAssemblyACM SIGSOFT Distinguished Artifact ISSTA Technical Papers Daniel Lehmann University of Stuttgart, Michelle Thalakottur Northeastern University, Frank Tip Northeastern University, Michael Pradel University of Stuttgart DOI | ||
14:45 15mTalk | Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly BinariesACM SIGSOFT Distinguished Paper ISSTA Technical Papers Ningyu He Peking University, Zhehao Zhao Peking University, Jikai Wang Huazhong University of Science and Technology, Yubin Hu Beijing University of Posts and Telecommunications, Shengjian (Daniel) Guo Baidu Security, Haoyu Wang Huazhong University of Science and Technology, Guangtai Liang Huawei Cloud Computing Technologies, Ding Li Peking University, Xiangqun Chen Peking University, Yao Guo Peking University DOI |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break Catering |
15:30 - 17:00 | |||
15:30 25mTalk | Runtime verification of hash code in mutable classes FTfJP Davide Ancona DIBRIS, University of Genova, Italy, Angelo Ferrando DIBRIS, Università di Genova, Viviana Mascardi DIBRIS, University of Genova, Italy | ||
15:55 25mTalk | Verifying Well-Typedness Preservation of Refactorings using Scope Graphs FTfJP Luka Miljak Delft University of Technology, Casper Bach Poulsen Delft University of Technology, Flip van Spaendonck TU Eindhoven DOI | ||
16:25 20mTalk | Using Rewrite Strategies for Efficient Functional Automatic Differentiation FTfJP Timon Böhler Technical University of Darmstadt, David Richter Technical University of Darmstadt, Mira Mezini TU Darmstadt Pre-print |
15:30 - 17:00 | ISSTA Online 1: SE and Deep LearningISSTA Technical Papers at Smith Classroom (Gates G10) Chair(s): Myra Cohen Iowa State University | ||
15:30 10mTalk | COME: Commit Message Generation with Modification Embedding ISSTA Technical Papers Yichen He Beihang University, Liran Wang Beihang University, Kaiyi Wang Beihang University, Yupeng Zhang Beihang University, Hang Zhang Beihang University, Zhoujun Li Beihang University DOI | ||
15:40 10mTalk | CODEP: Grammatical Seq2Seq Model for General-Purpose Code Generation ISSTA Technical Papers DOI Pre-print | ||
15:50 10mTalk | Towards More Realistic Evaluation for Neural Test Oracle Generation ISSTA Technical Papers DOI Pre-print | ||
16:00 10mTalk | Detecting Condition-Related Bugs with Control Flow Graph Neural Network ISSTA Technical Papers Jian Zhang Beihang University, Xu Wang Beihang University, Hongyu Zhang Chongqing University, Hailong Sun Beihang University, Xudong Liu Beihang University, Chunming Hu Beihang University, Yang Liu Nanyang Technological University DOI | ||
16:10 10mTalk | RefBERT: A Two-Stage Pre-trained Framework for Automatic Rename Refactoring ISSTA Technical Papers Hao Liu Xiamen University, Yanlin Wang Sun Yat-sen University, Zhao Wei Tencent, Yong Xu Tencent, Juhong Wang Tencent, Hui Li Xiamen University, Rongrong Ji Xiamen University DOI Pre-print | ||
16:20 10mTalk | Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? ISSTA Technical Papers Yutao Hu Huazhong University of Science and Technology, Suyuan Wang Huazhong University of Science and Technology, Wenke Li Huazhong University of Science and Technology, Junru Peng Wuhan University, Yueming Wu Nanyang Technological University, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
16:30 10mTalk | Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and Beyond ISSTA Technical Papers Ensheng Shi Xi’an Jiaotong University, Yanlin Wang Sun Yat-sen University, Hongyu Zhang Chongqing University, Lun Du Microsoft Research, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Hongbin Sun Xi’an Jiaotong University DOI |
15:30 - 17:00 | ISSTA Online 2: Static AnalysisISSTA Technical Papers at Habib Classroom (Gates G01) Chair(s): Julian Dolby IBM Research | ||
15:30 10mTalk | Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree ISSTA Technical Papers Tiancheng Hu Huazhong University of Science and Technology, Zijing Xu Huazhong University of Science and Technology, Yilin Fang Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Bin Yuan Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
15:40 10mTalk | Hybrid Inlining: A Framework for Compositional and Context-Sensitive Static Analysis ISSTA Technical Papers Jiangchao Liu Ant Group; ByteDance, Jierui Liu Ant Group, Peng Di Ant Group, Diyu Wu Ant Group, Hengjie Zheng Ant Group, Alex X. Liu Ant Group, Jingling Xue UNSW DOI | ||
15:50 10mTalk | CGuard: Scalable and Precise Object Bounds Protection for C ISSTA Technical Papers Piyus Kedia IIIT Delhi, Rahul Purandare University of Nebraska-Lincoln, Udit Kumar Agarwal University of British Columbia, Rishabh GGSIPU DOI | ||
16:00 10mTalk | Reducing the Memory Footprint of IFDS-Based Data-Flow Analyses using Fine-Grained Garbage CollectionACM SIGSOFT Distinguished Artifact ISSTA Technical Papers DOI | ||
16:10 10mTalk | GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing ISSTA Technical Papers Zihan Wang Shanghai Jiao Tong University, Pengbo Nie Shanghai Jiao Tong University, Xinyuan Miao Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Chengcheng Wan East China Normal University, Lei Bu Nanjing University, Jianjun Zhao Kyushu University DOI | ||
16:20 10mTalk | Splendor: Static Detection of Stored XSS in Modern Web Applications ISSTA Technical Papers He Su Institute of Information Engineering at Chinese Academy of Sciences, Feng Li Institute of Information Engineering at Chinese Academy of Sciences, Lili Xu Institute of Information Engineering at Chinese Academy of Sciences, Wenbo Hu Institute of Information Engineering at Chinese Academy of Sciences, Yujie Sun Institute of Information Engineering at Chinese Academy of Sciences, Qing Sun Institute of Information Engineering at Chinese Academy of Sciences, Huina Chao Institute of Information Engineering at Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences DOI | ||
16:30 10mTalk | Improving Bit-Blasting for Nonlinear Integer ConstraintsACM SIGSOFT Distinguished Paper ISSTA Technical Papers Fuqi Jia Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Rui Han Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Pei Huang Stanford University, Minghao Liu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Feifei Ma Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:40 10mTalk | Loop Invariant Inference through SMT Solving Enhanced Reinforcement Learning ISSTA Technical Papers Shiwen Yu National University of Defense Technology, Ting Wang National University of Defense Technology, Ji Wang National University of Defense Technology DOI |
15:30 - 17:00 | ISSTA Online 3: Empirical StudiesISSTA Technical Papers at Bezos Seminar Room (Gates G04) Chair(s): Jordan Samhi University of Luxembourg | ||
15:30 10mTalk | Understanding Breaking Changes in the Wild ISSTA Technical Papers Dhanushka Jayasuriya University of Auckland, Valerio Terragni University of Auckland, Jens Dietrich Victoria University of Wellington, Samuel Ou University of Auckland, Kelly Blincoe University of Auckland DOI | ||
15:40 10mTalk | LiResolver: License Incompatibility Resolution for Open Source Software ISSTA Technical Papers Sihan Xu Nankai University, Ya Gao Nankai University, Lingling Fan Nankai University, Linyu Li Nankai University, Xiangrui Cai Nankai University, Zheli Liu Nankai University DOI | ||
15:50 10mTalk | An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software ISSTA Technical Papers Chao Li Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Rui Chen Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Boxiang Wang Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Zhixuan Wang Xidian University, Tingting Yu Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Yunsong Jiang Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Mengfei Yang China Academy of Space Technology DOI | ||
16:00 10mTalk | An Empirical Study of Functional Bugs in Android AppsACM SIGSOFT Distinguished Paper ISSTA Technical Papers Yiheng Xiong East China Normal University, Mengqian Xu East China Normal University, Ting Su East China Normal University, Jingling Sun East China Normal University, Jue Wang Nanjing University, He Wen East China Normal University, Geguang Pu East China Normal University, Jifeng He East China Normal University, Zhendong Su ETH Zurich DOI | ||
16:10 10mTalk | Testing the Compiler for a New-Born Programming Language: An Industrial Case Study (Experience Paper) ISSTA Technical Papers Yingquan Zhao Tianjin University, Junjie Chen Tianjin University, Ruifeng Fu Tianjin University, Haojie Ye Huawei, Zan Wang Tianjin University DOI | ||
16:20 10mTalk | An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors ISSTA Technical Papers Kunlun Ren Huazhong University of Science and Technology, Qiang Weizhong Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, yi zhou Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
16:30 10mTalk | Security Checking of Trigger-Action-Programming Smart Home Integrations ISSTA Technical Papers Lei Bu Nanjing University, Qiuping Zhang Nanjing University, Suwan Li Nanjing University, Jinglin Dai Nanjing University, Guangdong Bai University of Queensland, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences, Xuandong Li Nanjing University DOI | ||
16:40 10mTalk | Third-Party Library Dependency for Large-Scale SCA in the C/C++ Ecosystem: How Far Are We? ISSTA Technical Papers Ling Jiang Southern University of Science and Technology, Hengchen Yuan Southern University of Science and Technology, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen Lab, Yuqun Zhang Southern University of Science and Technology DOI | ||
16:50 10mTalk | Who Judges the Judge: An Empirical Study on Online Judge Tests ISSTA Technical Papers Kaibo Liu Peking University, Yudong Han Peking University, Jie M. Zhang King’s College London, Zhenpeng Chen University College London, Federica Sarro University College London, Mark Harman University College London, Gang Huang Peking University; National Key Laboratory of Data Space Technology and System, Yun Ma Peking University DOI |
Wed 19 JulDisplayed time zone: Pacific Time (US & Canada) change
Wed 19 Jul
Displayed time zone: Pacific Time (US & Canada) change
08:00 - 08:30 | |||
08:00 30mCoffee break | Break Catering |
08:30 - 09:15 | |||
08:30 45mKeynote | Reflections on the Impact of Calculating Source Line Level Energy Information for Android Applications Keynotes |
09:15 - 10:00 | |||
09:15 45mKeynote | AITO Test of Time Award: Why Programming Languages Matter: Reflections on 45 Years of Language Design Keynotes Pre-print Media Attached |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering |
10:30 - 12:00 | ECOOP 1: SemanticsECOOP Research Papers at Amazon Auditorium (Gates G20) Chair(s): Sophia Drossopoulou Imperial College London | ||
10:30 15mTalk | Semantics for Noninterference with Interaction Trees ECOOP Research Papers Lucas Silver University of Pennsylvania, Paul He University of Pennsylvania, Ethan Cecchetti University of Maryland, College Park, Andrew K. Hirsch University at Buffalo, Steve Zdancewic University of Pennsylvania DOI | ||
10:45 15mTalk | Interaction Tree Specifications: A Framework for Specifying Recursive, Effectful Computations that Supports Auto-active Verification ECOOP Research Papers Lucas Silver University of Pennsylvania, Edwin Westbrook Galois, Matthew Yacavone Galois, Inc., Ryan Scott Galois, Inc. DOI | ||
11:00 15mTalk | Multi-Graded Featherweight Java ECOOP Research Papers Riccardo Bianchini University of Genoa, Francesco Dagnino University of Genoa, Paola Giannini University of Eastern Piedmont, Elena Zucca University of Genoa DOI | ||
11:15 15mTalk | Wiring circuits is easy as {0, 1, ω}, or is it… ECOOP Research Papers DOI | ||
11:30 15mTalk | Automata Learning with an Incomplete Teacher ECOOP Research Papers Mark Moeller Cornell University, Thomas Wiener Cornell University, Alaia Solko-Breslin University of Pennsylvania, Caleb Koch Stanford, Nate Foster Cornell University, Alexandra Silva Cornell University DOI | ||
11:45 15mTalk | A Direct-Style Effect Notation for Sequential and Parallel Programs ECOOP Research Papers David Richter Technical University of Darmstadt, Timon Böhler Technical University of Darmstadt, Pascal Weisenburger University of St. Gallen, Mira Mezini TU Darmstadt DOI Pre-print Media Attached |
10:30 - 12:00 | |||
10:30 - 12:00 | ISSTA 5: Improving Deep Learning SystemsISSTA Technical Papers at Smith Classroom (Gates G10) Chair(s): Michael Pradel University of Stuttgart | ||
10:30 15mTalk | Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper) ISSTA Technical Papers XuNie Huazhong University of Science and Technology; Beijing University of Posts and Telecommunications, Ningke Li Huazhong University of Science and Technology, Kailong Wang Huazhong University of Science and Technology, Shangguang Wang Beijing University of Posts and Telecommunications, Xiapu Luo Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology DOI | ||
10:45 15mTalk | Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis ISSTA Technical Papers Xiangzhe Xu Purdue University, Shiwei Feng Purdue University, Yapeng Ye Purdue University, Guangyu Shen Purdue University, Zian Su Purdue University, Siyuan Cheng Purdue University, Guanhong Tao Purdue University, Qingkai Shi Purdue University, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI | ||
11:00 15mTalk | CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement ISSTA Technical Papers Xuanqi Gao Xi’an Jiaotong University, Juan Zhai University of Massachusetts Amherst, Shiqing Ma UMass Amherst, Chao Shen Xi’an Jiaotong University, Yufei Chen Xi’an Jiaotong University; City University of Hong Kong, Shiwei Wang Xi’an Jiaotong University DOI Pre-print | ||
11:15 15mTalk | DeepAtash: Focused Test Generation for Deep Learning Systems ISSTA Technical Papers DOI | ||
11:30 15mTalk | Systematic Testing of the Data-Poisoning Robustness of KNN ISSTA Technical Papers Yannan Li University of Southern California, Jingbo Wang University of Southern California, Chao Wang University of Southern California DOI | ||
11:45 15mTalk | Semantic-Based Neural Network Repair ISSTA Technical Papers DOI |
10:30 - 12:00 | ISSTA 6: Testing 1ISSTA Technical Papers at Habib Classroom (Gates G01) Chair(s): Karine Even-Mendoza King’s College London | ||
10:30 15mTalk | Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing ISSTA Technical Papers Julia Kaiwen Lau Monash University Malaysia, Kelvin Kai Wen Kong Monash University Malaysia, Julian Hao Yong Monash University Malaysia, Per Hoong Tan Monash University Malaysia, Zhou Yang Singapore Management University, Zi Qian Yong Monash University Malaysia, Joshua Chern Wey Low Monash University Malaysia, Chun Yong Chong Monash University Malaysia, Mei Kuan Lim Monash University Malaysia, David Lo Singapore Management University DOI | ||
10:45 15mTalk | PhysCov: Physical Test Coverage for Autonomous Vehicles ISSTA Technical Papers Carl Hildebrandt University of Virginia, Meriel von Stein University of Virginia, Sebastian Elbaum University of Virginia Link to publication DOI Pre-print | ||
11:00 15mTalk | BehAVExplor: Behavior Diversity Guided Testing for Autonomous Driving Systems ISSTA Technical Papers Mingfei Cheng Singapore Management University, Yuan Zhou Nanyang Technological University, Xiaofei Xie Singapore Management University DOI | ||
11:15 15mTalk | Building Critical Testing Scenarios for Autonomous Driving from Real Accidents ISSTA Technical Papers Xudong Zhang Institute of Software at Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences DOI | ||
11:30 15mTalk | Virtual Reality (VR) Automated Testing in the Wild: A Case Study on Unity-Based VR Applications ISSTA Technical Papers Dhia Elhaq Rzig University of Michigan - Dearborn, Nafees Iqbal University of Michigan at Dearborn, Isabella Attisano Villanova University, Xue Qin Villanova University, Foyzul Hassan University of Michigan at Dearborn DOI | ||
11:45 15mTalk | Concept-Based Automated Grading of CS-1 Programming Assignments ISSTA Technical Papers Zhiyu Fan National University of Singapore, Shin Hwei Tan Concordia University, Canada, Abhik Roychoudhury National University of Singapore DOI |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
13:30 - 15:00 | ECOOP 2: ReplicationECOOP Research Papers at Amazon Auditorium (Gates G20) Chair(s): Eric Jul University of Oslo | ||
13:30 15mTalk | Behavioural Types for Local-First Software ECOOP Research Papers Roland Kuhn Actyx AG, Hernan Melgratti University of Buenos Aires, Argentina, Emilio Tuosto Gran Sasso Science Institute, L'Aquila, Italy DOI | ||
13:45 15mTalk | Algebraic Replicated Data Types: Programming Secure Local-First Software ECOOP Research Papers Christian Kuessner Technische Universität Darmstadt, Ragnar Mogk Technische Universität Darmstadt, Anna-Katharina Wickert TU Darmstadt, Germany, Mira Mezini TU Darmstadt DOI Pre-print | ||
14:00 15mTalk | Modular Verification of State-Based CRDTs in Separation Logic ECOOP Research Papers Abel Nieto Aarhus University, Arnaud Daby-Seesaram ENS Paris Saclay, Léon Gondelman Aarhus University, Amin Timany Aarhus University, Lars Birkedal Aarhus University DOI | ||
14:15 15mTalk | VeriFx: Correct Replicated Data Types for the Masses ECOOP Research Papers Kevin De Porre Vrije Universiteit Brussel, Carla Ferreira NOVA University Lisbon, Elisa Gonzalez Boix Vrije Universiteit Brussel DOI | ||
14:30 15mTalk | Nested Pure Operation-Based CRDTs ECOOP Research Papers DOI | ||
14:45 15mTalk | LoRe: A Programming Model for Verifiably Safe Local-First Software ECOOP Research Papers Julian Haas Technische Universität Darmstadt, Ragnar Mogk Technische Universität Darmstadt, Elena Yanakieva University of Kaiserslautern-Landau, Annette Bieniusa Kaiserslautern, Mira Mezini TU Darmstadt DOI Pre-print |
13:30 - 15:00 | ISSTA 7: Testing and Analysis of Machine-Learning SystemsISSTA Technical Papers at Smith Classroom (Gates G10) Chair(s): Vincenzo Riccio University of Udine | ||
13:30 15mTalk | FairRec: Fairness Testing for Deep Recommender Systems ISSTA Technical Papers Huizhong Guo Zhejiang University, Jinfeng Li Alibaba Group, Jingyi Wang Zhejiang University, Xiangyu Liu Alibaba Group, Dongxia Wang Zhejiang University, Zehong Hu Alibaba Group, Rong Zhang Alibaba Group, Hui Xue Alibaba Group DOI | ||
13:45 15mTalk | DyCL: Dynamic Neural Network Compilation Via Program Rewriting and Graph Optimization ISSTA Technical Papers Simin Chen University of Texas at Dallas, Shiyi Wei University of Texas at Dallas, Cong Liu University of California at Riverside, Wei Yang University of Texas at Dallas DOI | ||
14:00 15mTalk | Validating Multimedia Content Moderation Software via Semantic Fusion ISSTA Technical Papers Wenxuan Wang Chinese University of Hong Kong, Jingyuan Huang Chinese University of Hong Kong, Chang Chen Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Jianping Zhang Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Pinjia He Chinese University of Hong Kong, Michael Lyu Chinese University of Hong Kong DOI | ||
14:15 15mTalk | What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile Applications ISSTA Technical Papers Linlin Li Southern University of Science and Technology, Ruifeng Wang Northeastern University, Xian Zhan Southern University of Science and Technology, Ying Wang Northeastern University, Cuiyun Gao Harbin Institute of Technology, Sinan Wang Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology DOI | ||
14:30 15mTalk | How Effective Are Neural Networks for Fixing Security Vulnerabilities ISSTA Technical Papers Yi Wu Purdue University, Nan Jiang Purdue University, Hung Viet Pham University of Waterloo, Thibaud Lutellier University of Alberta, Jordan Davis Purdue University, Lin Tan Purdue University, Petr Babkin J.P. Morgan AI Research, Sameena Shah J.P. Morgan AI Research DOI | ||
14:45 15mTalk | ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems ISSTA Technical Papers Mingyi Zhou Monash University, Xiang Gao Beihang University, Jing Wu Monash University, John Grundy Monash University, Xiao Chen Monash University, Chunyang Chen Monash University, Li Li Beihang University DOI |
13:30 - 15:00 | ISSTA 8: Fuzzing 2ISSTA Technical Papers at Habib Classroom (Gates G01) Chair(s): Marcel Böhme MPI-SP; Monash University | ||
13:30 15mTalk | Guiding Greybox Fuzzing with Mutation TestingACM SIGSOFT Distinguished Paper ISSTA Technical Papers Vasudev Vikram Carnegie Mellon University, Isabella Laybourn Carnegie Mellon University, Ao Li Carnegie Mellon University, Nicole Nair Swarthmore College, Kelton OBrien University of Minnesota, Rafaello Sanna University of Rochester, Rohan Padhye Carnegie Mellon University DOI Pre-print Media Attached | ||
13:45 15mTalk | Rare Path Guided Fuzzing ISSTA Technical Papers Seemanta Saha University of California at Santa Barbara, Laboni Sarker University of California at Santa Barbara, Md Shafiuzzaman University of California at Santa Barbara, Chaofan Shou University of California at Santa Barbara, Albert Li University of California at Santa Barbara, Ganesh Sankaran University of California at Santa Barbara, Tevfik Bultan University of California at Santa Barbara DOI | ||
14:00 15mTalk | Finding Short Slow Inputs Faster with Grammar-Based Search ISSTA Technical Papers DOI | ||
14:15 15mTalk | Fuzzing Embedded Systems using Debug Interfaces ISSTA Technical Papers Max Eisele Robert Bosch; Saarland University, Daniel Ebert Robert Bosch, Christopher Huth Robert Bosch, Andreas Zeller CISPA Helmholtz Center for Information Security DOI Pre-print | ||
14:30 15mTalk | GrayC: Greybox Fuzzing of Compilers and Analysers for CACM SIGSOFT Distinguished Paper ISSTA Technical Papers Karine Even-Mendoza King’s College London, Arindam Sharma Imperial College London, Alastair F. Donaldson Imperial College London, Cristian Cadar Imperial College London DOI | ||
14:45 15mTalk | Fuzzing Deep Learning Compilers with HirGen ISSTA Technical Papers Haoyang Ma Hong Kong University of Science and Technology, Qingchao Shen Tianjin University, Yongqiang Tian University of Waterloo, Junjie Chen Tianjin University, Shing-Chi Cheung Hong Kong University of Science and Technology DOI |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break Catering |
15:30 - 17:00 | ECOOP 3: DistributionECOOP Research Papers at Amazon Auditorium (Gates G20) Chair(s): Elisa Gonzalez Boix Vrije Universiteit Brussel | ||
15:30 15mTalk | Synthetic Behavioural Typing: Sound, Regular Multiparty Sessions via Implicit Local Types ECOOP Research Papers Sung-Shik Jongmans Open University of the Netherlands; CWI, Francisco Ferreira Royal Holloway, University of London DOI | ||
15:45 15mTalk | Asynchronous Multiparty Session Type Implementability is Decidable – Lessons Learned from Message Sequence Charts ECOOP Research Papers Felix Stutz MPI-SWS DOI | ||
16:00 15mTalk | Dynamically Updatable Multiparty Session Protocols ECOOP Research Papers DOI | ||
16:15 15mTalk | Designing Asynchronous Multiparty Protocols with Crash-Stop Failures ECOOP Research Papers Adam D. Barwell University of St Andrews and University of Oxford, Ping Hou University of Oxford, Nobuko Yoshida University of Oxford, Fangyi Zhou Imperial College London DOI Pre-print | ||
16:30 15mTalk | ConDRust: Scalable Deterministic Concurrency from Verifiable Rust Programs ECOOP Research Papers Felix Suchert Center for Advancing Electronics Dresden, TU Dresden, Lisza Zeidler Composable Operating Systems Group, Barkhausen Institute, Dresden, Jeronimo Castrillon TU Dresden, Germany, Sebastian Ertel Composable Operating Systems Group, Barkhausen Institute, Dresden DOI | ||
16:45 15mTalk | Information Flow Analysis for Detecting Non-Determinism in Blockchain ECOOP Research Papers Luca Olivieri Ca’ Foscari University of Venice, Vincenzo Arceri University of Parma, Italy, Luca Negrini Ca’ Foscari University of Venice, Corvallis S.r.l., Fabio Tagliaferro CYS4 Srl, Pietro Ferrara Università Ca' Foscari, Venezia, Italy, Agostino Cortesi Università Ca' Foscari Venezia, Fausto Spoto U. Verona DOI |
15:30 - 17:00 | Tool DemonstrationsISSTA Tool Demonstrations at Microsoft Atrium (Allen Center) Chair(s): Jonathan Bell Northeastern University, Luís Pina University of Illinois at Chicago | ||
15:30 90mTalk | KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and Optimization ISSTA Tool Demonstrations Qinglong Wang Alibaba Group, Runzhe Wang Alibaba Group, Yuxi Hu Alibaba Group, Xiaohai Shi Alibaba Group, Zheng Liu Alibaba Group; Zhejiang University, Tao Ma Alibaba Group, Houbing Song University of Maryland, Baltimore County, Heyuan Shi Central South University | ||
15:30 90mTalk | RustSmith: Random Differential Compiler Testing for Rust ISSTA Tool Demonstrations Mayank Sharma Imperial College London, Pingshi Yu Imperial College London, Alastair F. Donaldson Imperial College London | ||
15:30 90mTalk | PExReport-Maven: Creating Pruned Executable Cross-Project Failure Reports in Maven Build System ISSTA Tool Demonstrations Media Attached | ||
15:30 90mTalk | EDHOC-Fuzzer: An EDHOC Protocol State Fuzzer ISSTA Tool Demonstrations Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens, Thanasis Typaldos National Technical University of Athens DOI Pre-print | ||
15:30 90mTalk | KDAlloc: The KLEE Deterministic Allocator ISSTA Tool Demonstrations Daniel Schemmel Imperial College London, Julian Büning RWTH Aachen University, Frank Busse Imperial College London, Martin Nowack Imperial College London, Cristian Cadar Imperial College London | ||
15:30 90mTalk | TreeLine and SlackLine: Grammar-Based Performance Fuzzing on Coffee Break ISSTA Tool Demonstrations | ||
15:30 90mTalk | SymRustC: A Hybrid Fuzzer for Rust ISSTA Tool Demonstrations Frédéric Tuong Simon Fraser University, Mohammad Omidvar Tehrani Simon Fraser University, Marco Gaboardi Boston University, Steve Ko Simon Fraser University | ||
15:30 90mTalk | ECSTATIC: Automatic Configuration-Aware Testing and Debugging of Static Analysis Tools ISSTA Tool Demonstrations Austin Mordahl University of Texas at Dallas, Dakota Soles The University of Texas at Dallas, Miao Miao The University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas | ||
15:30 90mTalk | EvoSpex: A Search-based Tool for Postcondition Inference ISSTA Tool Demonstrations Facundo Molina IMDEA Software Institute, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires Media Attached | ||
15:30 90mTalk | Behaviorally Typed State Machines in TypeScript for Heterogeneous Swarms ISSTA Tool Demonstrations | ||
15:30 90mTalk | DDLDroid: A Static Analyzer for Automatically Detecting Data Loss Issues in Android Applications ISSTA Tool Demonstrations Yuhao Zhou Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology Link to publication DOI Media Attached | ||
15:30 90mTalk | Oven: Safe and Live Communication Protocols in Scala, using Synthetic Behavioural Type Analysis ISSTA Tool Demonstrations Francisco Ferreira Royal Holloway, University of London, Sung-Shik Jongmans Open University of the Netherlands; CWI | ||
15:30 90mTalk | MetaData262: Automatic Test Suite Selection for Partial JavaScript Implementations ISSTA Tool Demonstrations Frederico Ramos Instituto Superior Técnico, Diogo Costa Reis Instituto Superior Técnico, Miguel Trigo Instituto Superior Técnico, António Morgado INESC-ID, José Fragoso Santos INESC-ID/Instituto Superior Técnico, Portugal | ||
15:30 90mTalk | RobotBT: Behavior-Tree-Based Test-Case Specification for the Robot Framework ISSTA Tool Demonstrations Sven Peldszus Ruhr University Bochum, Noubar Akopian Ruhr University Bochum, Thorsten Berger Ruhr University Bochum DOI Media Attached |
15:30 - 17:00 | ISSTA Online 4: Testing and Analysis of DL SystemsISSTA Technical Papers at Smith Classroom (Gates G10) Chair(s): Elena Sherman Boise State University | ||
15:30 10mTalk | A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation ISSTA Technical Papers Zhiyi Xue East China Normal University, Si Liu ETH Zurich, Zhaodi Zhang East China Normal University, Yiting Wu East China Normal University, Min Zhang East China Normal University DOI | ||
15:40 10mTalk | In Defense of Simple Techniques for Neural Network Test Case Selection ISSTA Technical Papers Shenglin Bao Fudan University, Chaofeng Sha Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University, Wenyun Zhao Fudan University DOI | ||
15:50 10mTalk | ROME: Testing Image Captioning Systems via Recursive Object Melting ISSTA Technical Papers BoXi Yu Chinese University of Hong Kong, Zhiqing Zhong Chinese University of Hong Kong, Jiaqi Li Chinese University of Hong Kong, Yixing Yang Chinese University of Hong Kong, Shilin He Microsoft Research, Pinjia He Chinese University of Hong Kong DOI | ||
16:00 10mTalk | ACETest: Automated Constraint Extraction for Testing Deep Learning Operators ISSTA Technical Papers Jingyi Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Xiao Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yuekang Li University of New South Wales, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, DongSong Yu Zhongguancun Laboratory, Chendong Yu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Hui Su Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yufeng Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences DOI | ||
16:10 10mTalk | Latent Imitator: Generating Natural Individual Discriminatory Instances for Black-Box Fairness Testing ISSTA Technical Papers Yisong Xiao Beihang University, Aishan Liu Beihang University; Institute of Dataspace, Li Tianlin Nanyang Technological University, Xianglong Liu Beihang University; Institute of Dataspace; Zhongguancun Laboratory DOI | ||
16:20 10mTalk | CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems ISSTA Technical Papers Quan Zhang Tsinghua University, Yongqiang Tian University of Waterloo, Yifeng Ding University of Illinois at Urbana-Champaign, Shanshan Li National University of Defense Technology, Chengnian Sun University of Waterloo, Yu Jiang Tsinghua University, Jiaguang Sun Tsinghua University DOI | ||
16:30 10mTalk | Back Deduction Based Testing for Word Sense Disambiguation Ability of Machine Translation Systems ISSTA Technical Papers Jun Wang Nanjing University, Yanhui Li Nanjing University, Xiang Huang Nanjing University, Lin Chen Nanjing University, Xiaofang Zhang Soochow University, Yuming Zhou Nanjing University DOI | ||
16:40 10mTalk | CydiOS: A Model-Based Testing Framework for iOS Apps ISSTA Technical Papers Shuohan Wu Hong Kong Polytechnic University, Jianfeng Li Xi’an Jiaotong University, Hao Zhou Hong Kong Polytechnic University, Yongsheng Fang Beijing University of Posts and Telecommunications, Kaifa ZHAO Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Chenxiong Qian University of Hong Kong, Xiapu Luo Hong Kong Polytechnic University DOI |
15:30 - 17:00 | ISSTA Online 5: Domain-Specific TestingISSTA Technical Papers at Habib Classroom (Gates G01) Chair(s): Michal Young University of Oregon | ||
15:30 10mTalk | DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity ISSTA Technical Papers Zhuo Chen Zhejiang University; Ant Group, Jie Liu Ant Group, Yubo Hu Xidian University, Lei Wu Zhejiang University, Yajin Zhou Zhejiang University, Yiling He Zhejiang University, Xianhao Liao Ant Group, Ke Wang Ant Group, Jinku Li Xidian University, Zhan Qin Zhejiang University DOI | ||
15:40 10mTalk | Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation ISSTA Technical Papers Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Haoxiang Jia Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Xiaotong Huang Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
15:50 10mTalk | DDLDroid: Efficiently Detecting Data Loss Issues in Android Apps ISSTA Technical Papers Yuhao Zhou Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI | ||
16:00 10mTalk | Exploring Missed Optimizations in WebAssembly Optimizers ISSTA Technical Papers Zhibo Liu Hong Kong University of Science and Technology, Dongwei Xiao Hong Kong University of Science and Technology, Li Zongjie Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Wei Meng Chinese University of Hong Kong DOI | ||
16:10 10mTalk | Vectorizing Program Ingredients for Better JVM Testing ISSTA Technical Papers Tianchang Gao Tianjin University, Junjie Chen Tianjin University, Yingquan Zhao Tianjin University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
16:20 10mTalk | 1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing ISSTA Technical Papers Songtao Yang Tsinghua University, Yubo He Information Engineering University, Kaixiang Chen Tsinghua University, Zheyu Ma Tsinghua University, Xiapu Luo Hong Kong Polytechnic University, Yong Xie Qinghai University, Jianjun Chen Tsinghua University, Chao Zhang Tsinghua University DOI | ||
16:30 10mTalk | SBDT: Search-Based Differential Testing of Certificate Parsers in SSL/TLS Implementations ISSTA Technical Papers Chu Chen Qufu Normal University, Pinghong Ren Qufu Normal University, Zhenhua Duan Xidian University, Cong Tian Xidian University, Xu Lu Xidian University, Bin Yu Xidian University DOI | ||
16:40 10mTalk | Silent Compiler Bug De-duplication via Three-Dimensional Analysis ISSTA Technical Papers Chen Yang Tianjin University, Junjie Chen Tianjin University, Xingyu Fan Tianjin University, Jiajun Jiang Tianjin University, Jun Sun Singapore Management University DOI | ||
16:50 10mTalk | Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features ISSTA Technical Papers Yiming Zhang Southern University of Science and Technology; Hong Kong Polytechnic University, Yuxin Hu Southern University of Science and Technology, Haonan Li Southern University of Science and Technology, Wenxuan Shi Southern University of Science and Technology, Zhenyu Ning Hunan University; Southern University of Science and Technology, Xiapu Luo Hong Kong Polytechnic University, Fengwei Zhang Southern University of Science and Technology DOI |
15:30 - 17:00 | ISSTA Online 6: Smart Contracts and AutomotiveISSTA Technical Papers at Bezos Seminar Room (Gates G04) Chair(s): Alex Groce Northern Arizona University | ||
15:30 10mTalk | SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis ISSTA Technical Papers Zeqin Liao Sun Yat-sen University, Sicheng Hao Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
15:40 10mTalk | DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols ISSTA Technical Papers Queping Kong Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Zigui Jiang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
15:50 10mTalk | Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts ISSTA Technical Papers Yuzhou Fang Hong Kong University of Science and Technology, Daoyuan Wu Chinese University of Hong Kong, Xiao Yi Chinese University of Hong Kong, Shuai Wang Hong Kong University of Science and Technology, Yufan Chen Xidian University, Mengjie Chen Mask Network, Yang Liu Nanyang Technological University, Lingxiao Jiang Singapore Management University DOI | ||
16:00 10mTalk | Testing Automated Driving Systems by Breaking Many Laws Efficiently ISSTA Technical Papers Xiaodong Zhang Xidian University, Zhao Wei Tencent, Yang Sun Singapore Management University, Jun Sun Singapore Management University, Yulong Shen Xidian University, Xuewen Dong Xidian University, Zijiang Yang GuardStrike DOI | ||
16:10 10mTalk | Simulation-Based Validation for Autonomous Driving Systems ISSTA Technical Papers Changwen Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Joseph Sifakis University Grenoble Alpes; CNRS; Grenoble INP; VERIMAG, Qiang Wang Academy of Military Sciences, Rongjie Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:20 10mTalk | Data Constraint Mining for Automatic Reconciliation Scripts Generation ISSTA Technical Papers Tianxiao Wang Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Chen Zhi Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Xiaoqun Zhou Alibaba Group, Jinjie Wu Alibaba Group, Jianwei Yin Zhejiang University, Shuiguang Deng Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies DOI |
17:30 - 20:30 | |||
Thu 20 JulDisplayed time zone: Pacific Time (US & Canada) change
Thu 20 Jul
Displayed time zone: Pacific Time (US & Canada) change
08:00 - 08:30 | |||
08:00 30mCoffee break | Break Catering |
08:30 - 09:00 | |||
08:30 30mAwards | ECOOP: Dahl-Nygaard Prize Ceremony and Awards Keynotes |
09:00 - 10:00 | |||
09:00 60mKeynote | Dahl-Nygaard Senior Prize: Safe Journeys into the Unknown – Object Capabilities Keynotes Media Attached |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering |
10:30 - 12:00 | ISSTA 9: Testing 2ISSTA Technical Papers at Amazon Auditorium (Gates G20) Chair(s): Cristian Cadar Imperial College London | ||
10:30 15mTalk | A Comprehensive Study on Quality Assurance Tools for Java ISSTA Technical Papers Han Liu East China Normal University, Sen Chen Tianjin University, Ruitao Feng UNSW, Chengwei Liu Nanyang Technological University, Kaixuan Li East China Normal University, Zhengzi Xu Nanyang Technological University, Liming Nie Nanyang Technological University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University DOI | ||
10:45 15mTalk | Transforming Test Suites into Croissants ISSTA Technical Papers Yang Chen University of Illinois at Urbana-Champaign, Alperen Yildiz Sabanci University, Darko Marinov University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign DOI | ||
11:00 15mTalk | SlipCover: Near Zero-Overhead Code Coverage for Python ISSTA Technical Papers Juan Altmayer Pizzorno University of Massachusetts Amherst, Emery D. Berger University of Massachusetts Amherst DOI | ||
11:15 15mTalk | To Kill a Mutant: An Empirical Study of Mutation Testing Kills ISSTA Technical Papers Hang Du University of California at Irvine, Vijay Krishna Palepu Microsoft, James Jones University of California at Irvine DOI | ||
11:30 15mTalk | Systematically Producing Test Orders to Detect Order-Dependent Flaky Tests ISSTA Technical Papers Chengpeng Li University of Texas at Austin, M. Mahdi Khosravi Middle East Technical University, Wing Lam George Mason University, August Shi University of Texas at Austin DOI | ||
11:45 15mTalk | Extracting Inline Tests from Unit Tests ISSTA Technical Papers Yu Liu University of Texas at Austin, Pengyu Nie University of Texas at Austin, Anna Guo University of Texas at Austin, Milos Gligoric University of Texas at Austin, Owolabi Legunsen Cornell University DOI |
10:30 - 12:00 | ISSTA 10: Test OptimizationsISSTA Technical Papers at Smith Classroom (Gates G10) Chair(s): Wing Lam University of Illinois at Urbana-Champaign | ||
10:30 15mTalk | More Precise Regression Test Selection via Reasoning about Semantics-Modifying ChangesACM SIGSOFT Distinguished Paper ISSTA Technical Papers Yu Liu University of Texas at Austin, Jiyang Zhang University of Texas at Austin, Pengyu Nie University of Texas at Austin, Milos Gligoric University of Texas at Austin, Owolabi Legunsen Cornell University DOI | ||
10:45 15mTalk | Catamaran: Low-Overhead Memory Safety Enforcement via Parallel Acceleration ISSTA Technical Papers Yiyu Zhang Nanjing University, Tianyi Liu Nanjing University, Zewen Sun Nanjing University, Zhe Chen Nanjing University of Aeronautics and Astronautics, Xuandong Li Nanjing University, Zhiqiang Zuo Nanjing University DOI | ||
11:00 15mTalk | Applying and Extending the Delta Debugging Algorithm for Elevator Dispatching Algorithms (Experience Paper) ISSTA Technical Papers DOI Pre-print | ||
11:15 15mTalk | June: A Type Testability Transformation for Improved ATG Performance ISSTA Technical Papers Dan Bruce University College London, David Kelly King’s College London, Hector Menendez King’s College London, Earl T. Barr University College London; Google DeepMind, David Clark University College London DOI | ||
11:30 15mTalk | Pattern-Based Peephole Optimizations with Java JIT Tests ISSTA Technical Papers Zhiqiang Zang University of Texas at Austin, Aditya Thimmaiah University of Texas at Austin, Milos Gligoric University of Texas at Austin DOI Pre-print | ||
11:45 15mTalk | GPUHarbor: Testing GPU Memory Consistency at Large (Experience Paper)ACM SIGSOFT Distinguished Artifact ISSTA Technical Papers Reese Levine University of California at Santa Cruz, Mingun Cho University of California at Davis, Devon McKee University of California at Santa Cruz, Andrew Quinn University of California at Santa Cruz, Tyler Sorensen University of California at Santa Cruz DOI |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
13:30 - 15:00 | ISSTA 11: Testing 3ISSTA Technical Papers at Amazon Auditorium (Gates G20) Chair(s): Marcelo d'Amorim North Carolina State University | ||
13:30 15mTalk | Dependency-Aware Metamorphic Testing of Datalog Engines ISSTA Technical Papers DOI | ||
13:45 15mTalk | GDsmith: Detecting Bugs in Cypher Graph Database Engines ISSTA Technical Papers Ziyue Hua Peking University, Wei Lin Peking University, Luyao Ren Peking University, Zongyang Li Peking University, Lu Zhang Peking University, Wenpin Jiao Peking University, Tao Xie Peking University DOI | ||
14:00 15mTalk | Testing Graph Database Engines via Query Partitioning ISSTA Technical Papers Matteo Kamm ETH Zurich, Manuel Rigger National University of Singapore, Chengyu Zhang ETH Zurich, Zhendong Su ETH Zurich DOI | ||
14:15 15mTalk | Toward Automated Detecting Unanticipated Price Feed in Smart Contract ISSTA Technical Papers Yifan Mo Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
14:30 15mTalk | Definition and Detection of Defects in NFT Smart Contracts ISSTA Technical Papers Shuo Yang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI |
13:30 - 15:00 | ECOOP 5: SynthesisECOOP Research Papers at Habib Classroom (Gates G01) Chair(s): Karine Even-Mendoza King’s College London | ||
13:30 15mTalk | Synthesis-Aided Crash Consistency for Storage Systems ECOOP Research Papers Jacob Van Geffen Veridise Inc., James Bornholt University of Texas at Austin, Emina Torlak Amazon Web Services and University of Washington, Xi Wang University of Washington DOI | ||
13:45 15mTalk | Synthesizing Conjunctive Queries for Code Search ECOOP Research Papers Chengpeng Wang Hong Kong University of Science and Technology, Peisen Yao Zhejing University, Wensheng Tang Hong Kong University of Science and Technology, Gang Fan Ant Group, Charles Zhang Hong Kong University of Science and Technology DOI | ||
14:00 15mTalk | Hoogle⋆: Constants and λ-abstractions in Petri-net-based Synthesis using Symbolic Execution ECOOP Research Papers Henrique Botelho Guerra INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon, João Costa Seco NOVA-LINCS; Nova University of Lisbon DOI | ||
14:15 15mTalk | Building Code Transpilers for Domain-Specific Languages Using Program Synthesis ECOOP Research Papers Sahil Bhatia University of California, Berkeley, Sumer Kohli UC Berkeley, Sanjit Seshia UC Berkeley, Alvin Cheung University of California at Berkeley DOI | ||
14:30 15mTalk | Do Machine Learning Models Produce TypeScript Types that Type Check? ECOOP Research Papers DOI Media Attached File Attached | ||
14:45 15mTalk | Toward Tool-Independent Summaries for Symbolic Execution ECOOP Research Papers Frederico Ramos Instituto Superior Técnico, Nuno Sabino Instituto Superior Técnico, Carnegie Mellon University, Pedro Adão IST-ULisboa and Instituto de Telecomunicações, David Naumann Stevens Institute of Technology, José Fragoso Santos INESC-ID/Instituto Superior Técnico, Portugal DOI |
13:30 - 15:00 | ISSTA 12: Web and Smart ContractsISSTA Technical Papers at Smith Classroom (Gates G10) Chair(s): Martin Kellogg New Jersey Institute of Technology | ||
13:30 15mTalk | Enhancing REST API Testing with NLP Techniques ISSTA Technical Papers Myeongsoo Kim Georgia Institute of Technology, Davide Corradini University of Verona, Saurabh Sinha IBM Research, Alessandro Orso Georgia Institute of Technology, Michele Pasqua University of Verona, Rachel Tzoref-Brill IBM Research, Mariano Ceccato University of Verona DOI | ||
13:45 15mTalk | AGORA: Automated Generation of Test Oracles for REST APIsACM SIGSOFT Distinguished Artifact ISSTA Technical Papers Juan C. Alonso University of Seville, Sergio Segura University of Seville, Antonio Ruiz-Cortés University of Seville DOI | ||
14:00 15mTalk | ωTest: WebView-Oriented Testing for Android Applications ISSTA Technical Papers Jiajun Hu Hong Kong University of Science and Technology, Lili Wei McGill University, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology DOI | ||
14:15 15mTalk | NodeRT: Detecting Races in Node.js Applications Practically ISSTA Technical Papers Jingyao Zhou Nanjing University, Lei Xu Nanjing University, Gongzheng Lu Suzhou City University, Weifeng Zhang Nanjing University of Posts and Telecommunications, Xiangyu Zhang Purdue University DOI | ||
14:30 15mTalk | iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements ISSTA Technical Papers Pengcheng Fang Case Western Reserve University, Zhenhua Zou Tsinghua University, Xusheng Xiao Arizona State University, Zhuotao Liu Tsinghua University DOI | ||
14:45 15mTalk | Automated Generation of Security-Centric Descriptions for Smart Contract BytecodeACM SIGSOFT Distinguished Paper ISSTA Technical Papers Yu Pan University of Utah, Zhichao Xu University of Utah, Levi Taiji Li University of Utah, Yunhe Yang University of Utah, Mu Zhang University of Utah DOI |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break Catering |
15:30 - 17:00 | |||
15:30 60mKeynote | Machine Learning for Software Engineering Keynotes | ||
16:30 15mDay closing | ISSTA'24 Preview Keynotes | ||
16:45 15mDay closing | ISSTA Closing Keynotes |
17:30 - 18:30 | |||
Fri 21 JulDisplayed time zone: Pacific Time (US & Canada) change
Fri 21 Jul
Displayed time zone: Pacific Time (US & Canada) change
08:00 - 08:30 | |||
08:00 30mCoffee break | Break Catering |
08:30 - 09:00 | |||
08:30 30mDay closing | ECOOP: Outlooks and Farewells Keynotes |
09:00 - 10:00 | |||
09:00 60mKeynote | Dahl-Nygaard Junior Prize: My Part of the Scala Story, and Beyond! Keynotes Media Attached |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering |
10:30 - 12:00 | ECOOP 7: Verification and TestingECOOP Research Papers at Amazon Auditorium (Gates G20) Chair(s): Wenxi Wang University of Texas at Austin | ||
10:30 15mTalk | On using VeriFast, VerCors, Plural, and KeY to check object usage ECOOP Research Papers João Mota NOVA School of Science and Technology, António Ravara NOVA LINCS & FCT, NOVA University of Lisbon, Marco Giunti NOVA-LINCS, FCT NOVA / Universidade Nova de Lisboa DOI | ||
10:45 15mTalk | Exact Separation Logic ECOOP Research Papers Petar Maksimović Imperial College London, UK, Caroline Cronjäger Ruhr-Universität Bochum, Andreas Lööw Imperial College London, Julian Sutherland Imperial College London, Philippa Gardner Imperial College London DOI Pre-print | ||
11:00 15mTalk | Morpheus: Automated Safety Verification of Data-dependent Parser Combinator Programs ECOOP Research Papers DOI | ||
11:15 15mTalk | Constraint Based Compiler Optimization for Energy Harvesting Applications ECOOP Research Papers DOI | ||
11:30 15mTalk | Dynamic Determinacy Race Detection for Task-Parallel Programs with Promises ECOOP Research Papers Feiyang Jin Georgia Institute of Technology, Lechen Yu Georgia Institute of Technology, Tiago Cogumbreiro University of Massachusetts Boston, Vivek Sarkar Georgia Institute of Technology, Jun Shirako Georgia Institute of Technology DOI | ||
11:45 15mTalk | On Leveraging Tests to Infer Nullable Annotations ECOOP Research Papers Jens Dietrich Victoria University of Wellington, David J. Pearce ConsenSys, Mahin Chandramohan Oracle Labs DOI |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |