Internetware 2024 (series) /
Internetware 2024 Program
Filter Program
Dates
Rooms
Tracks
Badges
Your Program
This program is tentative and subject to change.
Wed 24 JulDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Wed 24 Jul
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
08:30 - 09:00 | |||
08:30 30mDay opening | Opening Research Track |
09:00 - 10:00 | |||
09:00 60mKeynote | Keynote 1: Advances in Language-Based Testing Research Track Andreas Zeller CISPA Helmholtz Center for Information Security |
10:00 - 11:00 | |||
10:00 60mKeynote | Keynote 2: Development of System Software Stack for RISC-V+AI Computility Research Track Tao Xie Peking University |
11:00 - 11:20 | |||
12:35 - 14:30 | |||
14:30 - 15:30 | |||
14:30 60mKeynote | Keynote 3 : Development of System Software Stack for RISC-V+AI ComputilityResearch Track Research Track Hongxia Yang DAMO Academy, Alibaba Group |
15:30 - 15:50 | |||
16:50 - 18:05 | |||
16:50 15mFull-paper | Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source Software Research Track Junwei Zhang Zhejiang University, Zhongxin Liu Zhejiang University, Lingfeng Bao Zhejiang University, Zhenchang Xing CSIRO’s Data61; Australian National University, Xing Hu Zhejiang University, Xin Xia Huawei Technologies | ||
17:05 15mFull-paper | MatsVD: Boosting Statement-Level Vulnerability Detection via Dependency-Based Attention Research Track Cheng Weng , Yihao Qin , Bo Lin National University of Defense Technology, Pei Liu , Liqian Chen National University of Defense Technology, China | ||
17:20 15mFull-paper | Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study Research Track Yanzhong He Wuhan University of Technology, Guancheng Lin , Xiaoxue Ma City University of Hong Kong, Jacky Keung City University of Hong Kong, Cheng Tan Wuhan University of Technology, Wenhua Hu , Fuyang Li Wuhan University of Technology | ||
17:35 15mFull-paper | DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection Research Track Zhonghao Jiang , Weifeng Sun , Xiaoyan Gu , Jiaxin Wu , Tao Wen , Haibo Hu , Meng Yan Chongqing University | ||
17:50 15mFull-paper | T-RAP: A Template-guided Retrieval-Augmented Vulnerability Patch Generation Approach Research Track Pei Liu , Bo Lin National University of Defense Technology, Yihao Qin National University of Defense Technology, Cheng Weng , Liqian Chen National University of Defense Technology, China |
18:30 - 20:00 | |||
Thu 25 JulDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Thu 25 Jul
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 10:00 | |||
09:00 15mFull-paper | Structure-Sensitive Pointer Analysis for Multi-structure Objects Research Track Xun An Institute of Information Engineering, Chinese Academy of Sciences, Xiaoqi Jia Institute of Information Engineering, Chinese Academy of Sciences, Haichao Du Institute of Information Engineering, Chinese Academy of Sciences, Yamin Xie | ||
09:15 15mShort-paper | Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active Learning New Idea Track lianying he , Dalin Zhang Beijing Jiaotong University, Dongqing Zhu , Junwen Zhang , Rui Wang , Jiqiang liu | ||
09:30 15mFull-paper | Detecting Optimizing Compiler Bugs via History-Driven Test Program Mutation Research Track Junwei Zeng , Yixuan Tang Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Weiwei Li , Zhiqiu Huang Nanjing University of Aeronautics and Astronautics | ||
09:45 15mFull-paper | Accelerating Static Null Pointer Dereference Detection with Parallel Computing Research Track Runlin Xu National University of Defense Technology, Xiaoguang Mao National University of Defense Technology, Haifang Zhou National University of Defense Technology, Luohui Chen National University of Defense Technology, Ruyi Zhang , Yuanliang Zhang , Wei Xiao |
11:00 - 11:20 | |||
11:20 - 12:20 | |||
11:20 15mFull-paper | RepoMinCoder: Improving Repository-Level Code Generation Based on Information Loss Screening Research Track Yifan Li , Ensheng Shi Xi’an Jiaotong University, Dewu Zheng , Kefeng Duan , Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University | ||
11:35 15mFull-paper | Murphi2Chisel: A Protocol Compiler from Murphi to Chisel Research Track Cai Zhenghai , Yongjian Li Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China, Yongxin Zhao | ||
11:50 15mFull-paper | CCAF: Learning Code Change via AdapterFusion Research Track Wentao Zou , Zongwen Shen , Jidong Ge Nanjing University, Chuanyi Li Nanjing University, Bin Luo Nanjing University | ||
12:05 15mFull-paper | ExceRef: Automatically Refactoring for Exception Handling Research Track |
12:20 - 14:30 | |||
15:30 - 15:50 | |||
18:30 - 21:00 | |||
Fri 26 JulDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Fri 26 Jul
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 10:00 | |||
09:00 15mFull-paper | IOGuard: Software-Based I/O Page Fault Handling with One CPU Core Research Track | ||
09:15 15mFull-paper | Global State Awareness Automatic NUMA Balancing Research Track | ||
09:30 15mFull-paper | Resource-Aware Task Allocation on Mixed-Criticality Systems: a Task-Splitting Approach Research Track | ||
09:45 15mFull-paper | Parer: Boosting EROFS Image Creation With Parallelism and Reproducibility Research Track |
10:00 - 11:00 | |||
10:00 15mFull-paper | Developing Burr-XII NHPP-based software reliability growth model using Expectation Conditional Maximization Algorithm Research Track Sheng Han North Minzu University, Qiang Han North Minzu University, Yixin Qiao North Minzu University, Kehan Xue North Minzu University, Zhichao Shi North Minzu University | ||
10:15 15mFull-paper | ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java Research Track Yi Hou Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhijun Wang , Liuming Wang , Shuguang Chen , Yihan Wang , Lei Sang , Haijun Wang Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
10:30 15mFull-paper | Mining Fix Patterns for System Interaction Bugs Research Track di liu , Yanyan Yan Nanjing University, Hongcheng Fan Nanjing University, Yang Feng Nanjing University | ||
10:45 15mFull-paper | Towards Life-long Software Self-validation in Production Research Track |
11:00 - 11:20 | |||
11:20 - 12:20 | |||
11:20 15mFull-paper | LSTD-MTS: Anomaly Detection with Capturing Long-Term Spatio-Temporal Dependence for Multi-dimensional Time Series Research Track | ||
11:35 15mFull-paper | CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP Research Track | ||
11:50 15mFull-paper | A Bayesian LSTM Based Active Anomaly Detection Service for Large Online Systems Research Track | ||
12:05 15mFull-paper | LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes Research Track Xiaoyu Yi , Guolei Li Shanghai Jiao Tong University, Wenkai Huang Shanghai Jiao Tong University, Xi Lin Shanghai Jiao Tong University, Jianhua Li Shanghai JiaoTong University, Yuchen Liu North Carolina State University |
12:20 - 14:30 | |||
14:30 - 15:45 | |||
14:30 15mFull-paper | An Exploratory Study on God Header Files in Open-Source C Projects Research Track | ||
14:45 15mFull-paper | Reduce Detection Latency of YOLOv5 to Prevent Real-Time Tracking Failures for Lightweight Robots Research Track | ||
15:00 15mFull-paper | Efficient Deadlock Detection in MPI Programs with Path Compression and Focus Matching Research Track | ||
15:15 15mFull-paper | Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain Research Track | ||
15:30 15mFull-paper | The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading Research Track Shijian Chen , Jiachi Chen Sun Yat-sen University, Jiangshan Yu Monash University, Xiapu Luo The Hong Kong Polytechnic University, Yanlin Wang Sun Yat-sen University |
15:45 - 16:10 | |||
16:10 - 17:10 | |||
16:10 12mDemonstration | laTAPE: Location-Aware Programming and Executing Trigger-Action Rules Tool Demonstration Track | ||
16:22 12mDemonstration | MobileEdgeSim: A Tool for Simulating Microservice-Oriented Mobile Edge Computing Tool Demonstration Track | ||
16:34 12mDemonstration | RM2EIS: A Tool for Auto-Generation of EIS from Requirements Model Tool Demonstration Track Yihui Jian , Yilong Yang Beihang University, Shaohong Zhu , Zhi Li Guangxi Normal University, Li Zhang Beihang University | ||
16:46 12mDemonstration | WACP: A Performance Profiling Tool for WebAssembly-Python Interoperability Tool Demonstration Track | ||
16:58 12mDemonstration | VisRepo: A Visual Retrieval Tool for Large-Scale Open-Source Projects Tool Demonstration Track Xiaoqi Yue , Chao Liu Chongqing University, Neng Zhang Sun Yat-sen University, Haibo Hu Chongqing University, Xiaohong Zhang Chongqing University |
17:10 - 17:30 | |||
17:10 20mDay closing | Closing Research Track |