TCSE logo 
 Sigsoft logo
Sustainability badge

Dates
Wed 30 Apr 2025
Thu 1 May 2025
Fri 2 May 2025
Rooms
103
203
205
206 plus 208
207
210
211
212
213
215
Canada Hall 3 Poster Area
Tracks
ICSE Industry Challenge Track
ICSE Journal-first Papers
ICSE New Ideas and Emerging Results (NIER)
ICSE Research Track
ICSE SE In Practice (SEIP)
Badges
AI for SE
ARTIFACT
Analysis
Artifact-Available
Artifact-Functional
Artifact-Reusable
Award Winner
Blockchain
Design/Arch
Digital twins
Distinguished paper Award Candidate
FULL
Formal Methods
Hands-on
Human/Social
Prog. Comprehension/Reengg.
Quantum
Real-Time+Safety
Requirements
Research Methods
SE for AI
SHORT
Security
Testing and QA
Your Program
Nothing to filter

This program is tentative and subject to change.

You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 30 Apr

Displayed time zone: Eastern Time (US & Canada) change

11:00 - 12:30
Testing and SecurityResearch Track / Journal-first Papers at 211
Chair(s): Shiyi Wei University of Texas at Dallas
12:00
15m
Talk
TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability CodeSecurity
Research Track
Siyuan Li University of Chinese Academy of Sciences & Institute of Information Engineering Chinese Academy of Sciences, China, Yuekang Li UNSW, Zuxin Chen Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Chaopeng Dong Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Yongpan Wang University of Chinese Academy of Sciences & Institute of Information Engineering Chinese Academy of Sciences, China, Hong Li Institute of Information Engineering at Chinese Academy of Sciences, Yongle Chen Taiyuan University of Technology, China, Hongsong Zhu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
12:15
15m
Talk
Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be?Security
Journal-first Papers
Emanuele Iannone Hamburg University of Technology, Giulia Sellitto University of Salerno, Emanuele Iaccarino University of Salerno, Filomena Ferrucci University of Salerno, Andrea De Lucia University of Salerno, Fabio Palomba University of Salerno
Link to publication DOI Authorizer link Pre-print
11:00 - 12:30
SE for AI 1New Ideas and Emerging Results (NIER) / SE In Practice (SEIP) / Research Track at 215
Chair(s): Houari Sahraoui DIRO, Université de Montréal
11:45
15m
Talk
When in Doubt Throw It out: Building on Confident Learning for Vulnerability DetectionSecurityArtifact-FunctionalArtifact-ReusableArtifact-AvailableSE for AI
New Ideas and Emerging Results (NIER)
Yuanjun Gong Renmin University of China, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
13:30 - 14:00
13:30
30m
Talk
Towards Early Warning and Migration of High-Risk Dormant Open-Source Software DependenciesSecurity
New Ideas and Emerging Results (NIER)
Zijie Huang Shanghai Key Laboratory of Computer Software Testing and Evaluation, Lizhi Cai Shanghai Key Laboratory of Computer Software Testing & Evaluating, Shanghai Software Center, Xuan Mao Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai, China, Kang Yang Shanghai Key Laboratory of Computer Software Testing and Evaluating, Shanghai Development Center of Computer Software Technology
16:00 - 17:30
Formal Methods 2Research Track / New Ideas and Emerging Results (NIER) / Journal-first Papers at 103
Chair(s): Yi Li Nanyang Technological University
16:30
15m
Talk
LLM-aided Automatic Modeling for Security Protocol VerificationSecurityFormal Methods
Research Track
Ziyu Mao Zhejiang University, Jingyi Wang Zhejiang University, Jun Sun Singapore Management University, Shengchao Qin Xidian University, Jiawen Xiong East China Normal University
16:00 - 17:30
SE for AI with SecurityResearch Track at 210
16:00
15m
Talk
Understanding the Effectiveness of Coverage Criteria for Large Language Models: A Special Angle from Jailbreak AttacksSecuritySE for AIArtifact-Available
Research Track
shide zhou Huazhong University of Science and Technology, Li Tianlin NTU, Kailong Wang Huazhong University of Science and Technology, Yihao Huang NTU, Ling Shi Nanyang Technological University, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology
16:15
15m
Talk
Diversity Drives Fairness: Ensemble of Higher Order Mutants for Intersectional Fairness of Machine Learning SoftwareSecuritySE for AI
Research Track
Zhenpeng Chen Nanyang Technological University, Xinyue Li Peking University, Jie M. Zhang King's College London, Federica Sarro University College London, Yang Liu Nanyang Technological University
Pre-print
16:30
15m
Talk
HIFI: Explaining and Mitigating Algorithmic Bias through the Lens of Game-Theoretic InteractionsSecuritySE for AIArtifact-Available
Research Track
Lingfeng Zhang East China Normal University, Zhaohui Wang Software Engineering Institute, East China Normal University, Yueling Zhang East China Normal University, Min Zhang East China Normal University, Jiangtao Wang Software Engineering Institute, East China Normal University
16:45
15m
Talk
Towards More Trustworthy Deep Code Models by Enabling Out-of-Distribution DetectionSecuritySE for AI
Research Track
Yanfu Yan William & Mary, Viet Duong William & Mary, Huajie Shao College of William & Mary, Denys Poshyvanyk William & Mary
17:00
15m
Talk
FairSense: Long-Term Fairness Analysis of ML-Enabled SystemsSecuritySE for AIArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Yining She Carnegie Mellon University, Sumon Biswas Carnegie Mellon University, Christian Kästner Carnegie Mellon University, Eunsuk Kang Carnegie Mellon University

Thu 1 May

Displayed time zone: Eastern Time (US & Canada) change

10:30 - 11:00
10:30
30m
Talk
Using ML filters to help automated vulnerability repairs: when it helps and when it doesn’tSecurity
New Ideas and Emerging Results (NIER)
Maria Camporese University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
11:00 - 12:30
Security and Analysis 1Research Track / SE In Practice (SEIP) at 210
11:00
15m
Talk
Accounting for Missing Events in Statistical Information Leakage AnalysisSecurityArtifact-FunctionalArtifact-Available
Research Track
Seongmin Lee Max Planck Institute for Security and Privacy (MPI-SP), Shreyas Minocha Georgia Tech, Marcel Böhme MPI for Security and Privacy
11:15
15m
Talk
AssetHarvester: A Static Analysis Tool for Detecting Secret-Asset Pairs in Software ArtifactsSecurity
Research Track
Setu Kumar Basak North Carolina State University, K. Virgil English North Carolina State University, Ken Ogura North Carolina State University, Vitesh Kambara North Carolina State University, Bradley Reaves North Carolina State University, Laurie Williams North Carolina State University
11:30
15m
Talk
Enhancing The Open Network: Definition and Automated Detection of Smart Contract DefectsBlockchainSecurityAward Winner
Research Track
Hao Song , Teng Li University of Electronic Science and Technology of China, Jiachi Chen Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Beibei Li Sichuan University, Zhangyan Lin University of Electronic Science and Technology of China, Yi Lu BitsLab, Pan Li MoveBit, Xihan Zhou TonBit
11:45
15m
Talk
Detecting Python Malware in the Software Supply Chain with Program AnalysisArtifact-AvailableArtifact-FunctionalArtifact-ReusableSecurity
SE In Practice (SEIP)
Ridwan Salihin Shariffdeen SonarSource SA, Behnaz Hassanshahi Oracle Labs, Australia, Martin Mirchev National University of Singapore, Ali El Husseini National University of Singapore, Abhik Roychoudhury National University of Singapore
12:00
15m
Talk
$ZTD_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust DependenciesSecurity
Research Track
Paschal Amusuo Purdue University, Kyle A. Robinson Purdue University, Tanmay Singla Purdue University, Huiyun Peng Mount Holyoke College, Aravind Machiry Purdue University, Santiago Torres-Arias Purdue University, Laurent Simon Google, James C. Davis Purdue University
Pre-print
12:15
15m
Talk
FairChecker: Detecting Fund-stealing Bugs in DeFi Protocols via Fairness ValidationBlockchainSecurity
Research Track
Yi Sun Purdue University, USA, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University
13:00 - 13:30
13:00
30m
Talk
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools.Security
Journal-first Papers
Aurora Papotti Vrije Universiteit Amsterdam, Ranindya Paramitha University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
14:00 - 15:30
14:00
15m
Talk
The Seeds of the FUTURE Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning LibrariesSecurityAward Winner
Research Track
Zhiyuan Li , Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Tianyue Luo Institute of Software, Chinese Academy of Sciences, ZHIQING RUI Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences
14:00 - 15:30
AI for Security 1Research Track at 210
14:00
15m
Talk
Large Language Models as Configuration ValidatorsSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Xinyu Lian University of Illinois at Urbana-Champaign, Yinfang Chen University of Illinois at Urbana-Champaign, Runxiang Cheng University of Illinois at Urbana-Champaign, Jie Huang University of Illinois at Urbana-Champaign, Parth Thakkar Meta Platforms, Inc., Minjia Zhang UIUC, Tianyin Xu University of Illinois at Urbana-Champaign
14:15
15m
Talk
LLM Assistance for Memory SafetySecurity
Research Track
Nausheen Mohammed Microsoft Research, Akash Lal Microsoft Research, Aseem Rastogi Microsoft Research, Subhajit Roy IIT Kanpur, Rahul Sharma Microsoft Research
14:30
15m
Talk
Vulnerability Detection with Code Language Models: How Far Are We?Security
Research Track
Yangruibo Ding Columbia University, Yanjun Fu University of Maryland, Omniyyah Ibrahim King Abdulaziz City for Science and Technology, Chawin Sitawarin University of California, Berkeley, Xinyun Chen , Basel Alomair King Abdulaziz City for Science and Technology, David Wagner UC Berkeley, Baishakhi Ray Columbia University, New York;, Yizheng Chen University of Maryland
14:45
15m
Talk
Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with JustificationsBlockchainSecurity
Research Track
Wei Ma , Daoyuan Wu The Hong Kong University of Science and Technology, Yuqiang Sun Nanyang Technological University, Tianwen Wang National University of Singapore, Shangqing Liu Nanyang Technological University, Jian Zhang Nanyang Technological University, Yue Xue , Yang Liu Nanyang Technological University
15:00
15m
Talk
Towards Neural Synthesis for SMT-assisted Proof-Oriented ProgrammingSecurityFormal MethodsAward Winner
Research Track
Saikat Chakraborty Microsoft Research, Gabriel Ebner Microsoft Research, Siddharth Bhat University of Cambridge, Sarah Fakhoury Microsoft Research, Sakina Fatima University of Ottawa, Shuvendu K. Lahiri Microsoft Research, Nikhil Swamy Microsoft Research
15:15
15m
Talk
Prompt-to-SQL Injections in LLM-Integrated Web Applications: Risks and DefensesSecuritySE for AIArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Rodrigo Resendes Pedro INESC-ID / IST, Universidade de Lisboa, Miguel E. Coimbra INESC-ID / IST, Universidade de Lisboa, Daniel Castro INESC-ID / IST, Universidade de Lisboa, Paulo Carreira INESC-ID / IST, Universidade de Lisboa, Nuno Santos INESC-ID / Instituto Superior Tecnico, University of Lisbon
14:00 - 15:30
Industry Challenge PresentationsIndustry Challenge Track at 211
14:45
15m
Talk
CommitShield: Tracking Vulnerability Introduction and Fix in Version Control SystemsSecurity
Industry Challenge Track
Zhaonan Wu Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Chen Wei MYbank, Ant Group, Zirui Wan Huazhong University of Science and Technology, Yue Liu Monash University, Haoyu Wang Huazhong University of Science and Technology
15:30 - 16:00
15:30
30m
Talk
Towards Early Warning and Migration of High-Risk Dormant Open-Source Software DependenciesSecurity
New Ideas and Emerging Results (NIER)
Zijie Huang Shanghai Key Laboratory of Computer Software Testing and Evaluation, Lizhi Cai Shanghai Key Laboratory of Computer Software Testing & Evaluating, Shanghai Software Center, Xuan Mao Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai, China, Kang Yang Shanghai Key Laboratory of Computer Software Testing and Evaluating, Shanghai Development Center of Computer Software Technology

Fri 2 May

Displayed time zone: Eastern Time (US & Canada) change

10:30 - 11:00
10:30
30m
Talk
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools.Security
Journal-first Papers
Aurora Papotti Vrije Universiteit Amsterdam, Ranindya Paramitha University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
11:00 - 12:30
Testing and QA 4Research Track at 205
11:00
15m
Talk
DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path PlannersSecurity
Research Track
Yue Wang , Chao Yang Xidian University, Xiaodong Zhang , Yuwanqi Deng Xidian University, Jianfeng Ma Xidian University
11:00 - 12:30
11:00
15m
Talk
Relationship Status: “It’s complicated” Developer-Security Expert Dynamics in ScrumSecurity
Research Track
Houda Naji Ruhr University Bochum, Marco Gutfleisch Ruhr University Bochum, Alena Naiakshina Ruhr University Bochum
11:00 - 12:30
Security and Analysis 2Research Track at 210
11:00
15m
Talk
A Study of Undefined Behavior Across Foreign Function Boundaries in Rust LibrariesSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Ian McCormack Carnegie Mellon University, Joshua Sunshine Carnegie Mellon University, Jonathan Aldrich Carnegie Mellon University
Pre-print
11:15
15m
Talk
Cooperative Software Verification via Dynamic Program SplittingSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Cedric Richter University of Oldenburg, Marek Chalupa Institute of Science and Technology Austria, Marie-Christine Jakobs LMU Munich, Germany, Heike Wehrheim University of Oldenburg
11:30
15m
Talk
Exposing the Hidden Layer: Software Repositories in the Service of SEO ManipulationSecurityArtifact-FunctionalArtifact-Available
Research Track
Mengying Wu Fudan University, Geng Hong Fudan University, Wuyuao Mai Fudan University, Xinyi Wu Fudan University, Lei Zhang Fudan University, Yingyuan Pu QI-ANXIN Technology Research Institute, Huajun Chai QI-ANXIN Technology Research Institute, Lingyun Ying Qi An Xin Group Corp., Haixin Duan Institute for Network Science and Cyberspace, Tsinghua University; Qi An Xin Group Corp., Min Yang Fudan University
11:45
15m
Talk
Hetrify: Efficient Verification of Heterogeneous Programs on RISC-VSecurityAward Winner
Research Track
Yiwei Li School of Computer, National Univer sity of Defense Technology, Liangze Yin School of Computer, National Univer sity of Defense Technology, Wei Dong National University of Defense Technology, Jiaxin Liu National University of Defense Technology, Yanfeng Hu School of Computer, National Univer sity of Defense Technology, Shanshan Li National University of Defense Technology
12:00
15m
Talk
Hyperion: Unveiling DApp Inconsistencies using LLM and Dataflow-Guided Symbolic ExecutionSecurity
Research Track
Shuo Yang Sun Yat-sen University, Xingwei Lin Ant Group, Jiachi Chen Sun Yat-sen University, Qingyuan Zhong Sun Yat-sen University, Lei Xiao Sun Yat-sen University, renke huang Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
12:15
15m
Talk
SmartReco: Detecting Read-Only Reentrancy via Fine-Grained Cross-DApp AnalysisSecurity
Research Track
Jingwen Zhang School of Software Engineering, Sun Yat sen University, Zibin Zheng Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Mingxi Ye Sun Yat-sen University, Kaiwen Ning Sun Yat-sen University, Yu Zhang Harbin Institute of Technology, Weizhe Zhang Harbin Institute of Technology
11:00 - 12:30
12:15
7m
Talk
Using ML filters to help automated vulnerability repairs: when it helps and when it doesn’tSecurity
New Ideas and Emerging Results (NIER)
Maria Camporese University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
13:00 - 13:30
13:00
30m
Talk
Using ML filters to help automated vulnerability repairs: when it helps and when it doesn’tSecurity
New Ideas and Emerging Results (NIER)
Maria Camporese University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
14:00 - 15:30
14:45
15m
Talk
Vision Transformer Inspired Automated Vulnerability RepairSecurity
Journal-first Papers
Michael Fu The University of Melbourne, Van Nguyen Monash University, Kla Tantithamthavorn Monash University, Dinh Phung Monash University, Australia, Trung Le Monash University, Australia
14:00 - 15:30
15:00
7m
Talk
Toward Effective Secure Code Reviews: An Empirical Study of Security-Related Coding WeaknessesSecurity
Journal-first Papers
Wachiraphan (Ping) Charoenwet University of Melbourne, Patanamon Thongtanunam University of Melbourne, Thuan Pham University of Melbourne, Christoph Treude Singapore Management University
14:00 - 15:30
15:15
7m
Talk
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools.Security
Journal-first Papers
Aurora Papotti Vrije Universiteit Amsterdam, Ranindya Paramitha University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
14:00 - 15:30
Security and Analysis 3Research Track / SE In Practice (SEIP) at 210
14:00
15m
Talk
Automated, Unsupervised, and Auto-parameterized Inference of Data Patterns and Anomaly DetectionSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Qiaolin Qin Polytechnique Montréal, Heng Li Polytechnique Montréal, Ettore Merlo Polytechnique Montreal, Maxime Lamothe Polytechnique Montreal
Pre-print
14:15
15m
Talk
On Prescription or Off Prescription? An Empirical Study of Community-prescribed Security Configurations for KubernetesSecurityArtifact-Available
Research Track
Shazibul Islam Shamim Auburn University, Hanyang Hu Company A, Akond Rahman Auburn University
14:30
15m
Talk
Similar but Patched Code Considered Harmful -- The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove ThemSecurity
Research Track
Zixuan Tan Zhejiang University, Jiayuan Zhou Huawei, Xing Hu Zhejiang University, Shengyi Pan Zhejiang University, Kui Liu Huawei, Xin Xia Huawei
14:45
15m
Talk
TIVER: Identifying Adaptive Versions of C/C++ Third-Party Open-Source Components Using a Code Clustering TechniqueSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Youngjae Choi Korea University, Seunghoon Woo Korea University
15:00
15m
Talk
A scalable, effective and simple Vulnerability Tracking approach for heterogeneous SAST setups based on Scope+OffsetSecurity
SE In Practice (SEIP)
James Johnson --, Julian Thome GitLab Inc., Lucas Charles GitLab Inc., Hua Yan GitLab Inc., Jason Leasure GitLab Inc.
Pre-print
15:15
15m
Talk
''ImmediateShortTerm3MthsAfterThatLOL'': Developer Secure-Coding Sentiment, Practice and Culture in OrganisationsArtifact-AvailableArtifact-FunctionalArtifact-ReusableSecurity
SE In Practice (SEIP)
Ita Ryan University College Cork, Utz Roedig University College Cork, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital
14:00 - 15:30
Design and Architecture 2Journal-first Papers / Research Track at 211
14:00
15m
Talk
An Exploratory Study on the Engineering of Security FeaturesSecurityArtifact-FunctionalArtifact-Available
Research Track
Kevin Hermann Ruhr University Bochum, Sven Peldszus Ruhr University Bochum, Jan-Philipp Steghöfer XITASO GmbH IT & Software Solutions, Thorsten Berger Ruhr University Bochum
14:00 - 15:30
AI for Security 2Research Track at 213
14:00
15m
Talk
Repository-Level Graph Representation Learning for Enhanced Security Patch DetectionSecurity
Research Track
Xin-Cheng Wen Harbin Institute of Technology, Zirui Lin Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Hongyu Zhang Chongqing University, Yong Wang Anhui Polytechnic University, Qing Liao Harbin Institute of Technology
14:15
15m
Talk
FAMOS: Fault diagnosis for Microservice Systems through Effective Multi-modal Data FusionSecurity
Research Track
Chiming Duan Peking University, Yong Yang Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Guiyang Liu Alibaba, Jinbu Liu Alibaba, Huxing Zhang Alibaba Group, Qi Zhou Alibaba, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University
14:30
15m
Talk
Leveraging Large Language Models to Detect npm Malicious PackagesSecurity
Research Track
Nusrat Zahan North Carolina State University, Philipp Burckhardt Socket, Inc, Mikola Lysenko Socket, Inc, Feross Aboukhadijeh Socket, Inc, Laurie Williams North Carolina State University
14:45
15m
Talk
Magika: AI-Powered Content-Type DetectionSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
15:00
15m
Talk
Closing the Gap: A User Study on the Real-world Usefulness of AI-powered Vulnerability Detection & Repair in the IDESecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Benjamin Steenhoek Microsoft, Siva Sivaraman Microsoft, Renata Saldivar Gonzalez Microsoft, Yevhen Mohylevskyy Microsoft, Roshanak Zilouchian Moghaddam Microsoft, Wei Le Iowa State University
15:15
15m
Talk
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code NaturalnessSecurity
Research Track
Weisong Sun Nanjing University, Yuchen Chen Nanjing University, Mengzhe Yuan Nanjing University, Chunrong Fang Nanjing University, Zhenpeng Chen Nanyang Technological University, Chong Wang Nanyang Technological University, Yang Liu Nanyang Technological University, Baowen Xu State Key Laboratory for Novel Software Technology, Nanjing University, Zhenyu Chen Nanjing University
Pre-print
16:00 - 17:30
16:45
15m
Talk
VulNet: Towards improving vulnerability management in the Maven ecosystemSecurity
Journal-first Papers
Zeyang Ma Concordia University, Shouvick Mondal IIT Gandhinagar, Tse-Hsun (Peter) Chen Concordia University, Haoxiang Zhang Centre for Software Excellence at Huawei Canada, Ahmed E. Hassan Queen’s University, Zeyang Ma Concordia University
16:00 - 17:30
Mobile SoftwareResearch Track at 207
16:00
15m
Talk
EP-Detector: Automatic Detection of Error-prone Operation Anomalies in Android ApplicationsSecurity
Research Track
Chenkai Guo Nankai University, China, Qianlu Wang College of Cyber Science, Nankai University, Naipeng Dong The University of Queensland, Australia, Lingling Fan Nankai University, Tianhong Wang College of Computer Science, Nankai University, Weijie Zhang College of Computer Science, Nankai University, EnBao Chen College of Cyber Science, Nankai University, Zheli Liu Nankai University, Lu Yu National University of Defense Technology; Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation
17:15
15m
Talk
PacDroid: A Pointer-Analysis-Centric Framework for Security Vulnerabilities in Android AppsSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Menglong Chen Nanjing University, Tian Tan Nanjing University, Minxue Pan Nanjing University, Yue Li Nanjing University
16:00 - 17:30
16:00
15m
Talk
ROSA: Finding Backdoors with FuzzingSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Dimitri Kokkonis Université Paris-Saclay, CEA, List, Michaël Marcozzi Université Paris-Saclay, CEA, List, Emilien Decoux Université Paris-Saclay, CEA List, Stefano Zacchiroli Télécom Paris, Polytechnic Institute of Paris
Pre-print Media Attached
16:15
15m
Talk
Analyzing the Feasibility of Adopting Google's Nonce-Based CSP Solutions on WebsitesSecurityArtifact-Available
Research Track
Mengxia Ren Colorado School of Mines, Anhao Xiang Colorado School of Mines, Chuan Yue Colorado School of Mines
16:30
15m
Talk
Early Detection of Performance Regressions by Bridging Local Performance Data and Architectural ModelsSecurityAward Winner
Research Track
Lizhi Liao Memorial University of Newfoundland, Simon Eismann University of Würzburg, Heng Li Polytechnique Montréal, Cor-Paul Bezemer University of Alberta, Diego Costa Concordia University, Canada, André van Hoorn University of Hamburg, Germany, Weiyi Shang University of Waterloo
16:45
15m
Talk
Revisiting the Performance of Deep Learning-Based Vulnerability Detection on Realistic DatasetsSecurity
Journal-first Papers
Partha Chakraborty University of Waterloo, Krishna Kanth Arumugam University of Waterloo, Mahmoud Alfadel University of Calgary, Mei Nagappan University of Waterloo, Shane McIntosh University of Waterloo
17:00
15m
Talk
Sunflower: Enhancing Linux Kernel Fuzzing via Exploit-Driven Seed GenerationArtifact-AvailableArtifact-FunctionalArtifact-ReusableSecurity
SE In Practice (SEIP)
Qiang Zhang Hunan University, Yuheng Shen Tsinghua University, Jianzhong Liu Tsinghua University, Yiru Xu Tsinghua University, Heyuan Shi Central South University, Yu Jiang Tsinghua University, Wanli Chang College of Computer Science and Electronic Engineering, Hunan University
17:15
15m
Talk
Practical Object-Level Sanitizer With Aggregated Memory Access and Custom AllocatorSecurity
Research Track
Xiaolei wang National University of Defense Technology, Ruilin Li National University of Defense Technology, Bin Zhang National University of Defense Technology, Chao Feng National University of Defense Technology, Chaojing Tang National University of Defense Technology
16:00 - 17:30
16:00
15m
Talk
GVI: Guided Vulnerability Imagination for Boosting Deep Vulnerability DetectorsSecurity
Research Track
Heng Yong Nanjing University, Zhong Li , Minxue Pan Nanjing University, Tian Zhang Nanjing University, Jianhua Zhao Nanjing University, China, Xuandong Li Nanjing University
16:15
15m
Talk
Decoding Secret Memorization in Code LLMs Through Token-Level CharacterizationSecurity
Research Track
Yuqing Nie Beijing University of Posts and Telecommunications, Chong Wang Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Guoai Xu Harbin Institute of Technology, Shenzhen, Guosheng Xu Key Laboratory of Trustworthy Distributed Computing and Service (MoE), Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology
16:30
15m
Talk
Are We Learning the Right Features? A Framework for Evaluating DL-Based Software Vulnerability Detection SolutionsSecurityArtifact-FunctionalArtifact-AvailableArtifact-Reusable
Research Track
Satyaki Das University of Southern California, Syeda Tasnim Fabiha University of Southern California, Saad Shafiq University of Southern California, Nenad Medvidović University of Southern California
Pre-print
16:45
15m
Talk
Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention InferenceSecurity
Research Track
Chong Wang Nanyang Technological University, Jianan Liu Fudan University, Xin Peng Fudan University, Yang Liu Nanyang Technological University, Yiling Lou Fudan University
17:00
15m
Talk
Weakly-supervised Log-based Anomaly Detection with Inexact Labels via Multi-instance LearningSecurity
Research Track
Minghua He Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Chiming Duan Peking University, Huaqian Cai Peking University, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University
17:15
7m
Talk
Towards Early Warning and Migration of High-Risk Dormant Open-Source Software DependenciesSecurity
New Ideas and Emerging Results (NIER)
Zijie Huang Shanghai Key Laboratory of Computer Software Testing and Evaluation, Lizhi Cai Shanghai Key Laboratory of Computer Software Testing & Evaluating, Shanghai Software Center, Xuan Mao Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai, China, Kang Yang Shanghai Key Laboratory of Computer Software Testing and Evaluating, Shanghai Development Center of Computer Software Technology
:
: