Internetware 2024 (series) / 
Internetware 2024 Program
  Filter Program 
Dates
Rooms
Tracks
Badges
 Your Program
Wed 24 JulDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Wed 24 Jul
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
| 08:30 - 09:00 | |||
| 08:3030m Day opening | Opening Research Track | ||
| 09:00 - 10:00 | |||
| 09:0060m Keynote | Keynote 1: Advances in Language-Based Testing Research Track Andreas Zeller CISPA Helmholtz Center for Information SecurityPre-print | ||
| 10:00 - 11:00 | |||
| 10:0060m Keynote | Keynote 2: Development of System Software Stack for RISC-V+AI Computility Research Track Tao Xie Peking University | ||
| 11:00 - 11:20 | |||
| 11:20 - 12:35 | Session 1: AI for Software EngineeringTool Demonstration Track / New Idea Track / Research Track at Main Conference Room Chair(s): Yongqiang Tian The Hong Kong University of Science and Technology | ||
| 11:2015m Full-paper | An Empirical Study on Code Search Pre-trained Models: Academic Progresses vs. Industry Requirements Research Track | ||
| 11:3515m Full-paper | CRABS-former: Cross-Architecture Binary Code Similarity Detection based on Transformer Research Track Yuhong Feng Shenzhen University, Haoran Li Shenzhen University, Yixuan Cao ShenZhen University, Yufeng Wang ShenZhen University, Haiyue Feng College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China | ||
| 11:5015m Full-paper | On the Heterophily of Program Graphs: A Case Study of Graph-based Type Inference Research Track Senrong Xu , Jiamei Shen , Yunfang Li , Yuan Yao Nanjing University, Ping Yu , Feng Xu Nanjing University, Xiaoxing Ma Nanjing University | ||
| 12:0515m Full-paper | An Exploratory Evaluation of Large Language Models Using Empirical Software Engineering Tasks Research Track Wenjun Liang Nanjing University of Aeronautics and Astronautics, China, Guanping Xiao Nanjing University of Aeronautics and Astronautics | ||
| 12:2015m Full-paper | LLM-Enhanced Theorem Proving with Term Explanation and Tactic Parameter Repair Research Track Xingpeng Liu , Hengzhu Liu , Xiaodong Yi , Ji Wang School of Computer, National University of Defense Technology, China | ||
| 12:35 - 14:30 | |||
| 14:30 - 15:30 | |||
| 14:3060m Keynote | Keynote 3 : Edge GenAI: Pioneering the Next Phase of AI Evolution Research Track Hongxia Yang The Hong Kong Polytechnic University | ||
| 15:30 - 15:50 | |||
| 16:50 - 18:05 | Session 3: Software Vulnerability and SecurityResearch Track at Main Conference Room Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
| 16:5015m Full-paper | Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source Software Research Track Junwei Zhang Zhejiang University, Zhongxin Liu Zhejiang University, Lingfeng Bao  Zhejiang University, Zhenchang Xing CSIRO’s Data61; Australian National University, Xing Hu Zhejiang University, Xin Xia Huawei Technologies | ||
| 17:0515m Full-paper | MatsVD: Boosting Statement-Level Vulnerability Detection via Dependency-Based Attention Research Track Cheng Weng , Yihao Qin , Bo Lin National University of Defense Technology, Pei Liu , Liqian Chen National University of Defense Technology, China | ||
| 17:2015m Full-paper | Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study Research Track Yanzhong He Wuhan University of Technology, Guancheng Lin , Xiaoxue Ma City University of Hong Kong, Jacky Keung City University of Hong Kong, Cheng Tan Wuhan University of Technology, Wenhua Hu , Fuyang Li Wuhan University of Technology | ||
| 17:3515m Full-paper | DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection Research Track Zhonghao Jiang , Weifeng Sun , Xiaoyan Gu , Jiaxin Wu , Tao Wen , Haibo Hu , Meng Yan Chongqing University | ||
| 17:5015m Full-paper | T-RAP: A Template-guided Retrieval-Augmented Vulnerability Patch Generation Approach Research Track Pei Liu , Bo Lin National University of Defense Technology, Yihao Qin National University of Defense Technology, Cheng Weng , Liqian Chen National University of Defense Technology, China | ||
| 18:30 - 20:00 | |||
Thu 25 JulDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Thu 25 Jul
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
| 09:00 - 10:00 | Session 4: Code Analysis and OptimizationResearch Track / New Idea Track at Main Conference Room Chair(s): Yanlin Wang Sun Yat-sen University | ||
| 09:0015m Full-paper | Structure-Sensitive Pointer Analysis for Multi-structure Objects Research Track Xun An Institute of Information Engineering, Chinese Academy of Sciences, Xiaoqi Jia Institute of Information Engineering, Chinese Academy of Sciences, Haichao Du Institute of Information Engineering, Chinese Academy of Sciences, Yamin Xie  | ||
| 09:1515m Short-paper | Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active Learning New Idea Track lianying he , Dalin Zhang Beijing Jiaotong University, Dongqing Zhu , Junwen Zhang , Rui Wang , Jiqiang liu  | ||
| 09:3015m Full-paper | Detecting Optimizing Compiler Bugs via History-Driven Test Program Mutation Research Track Junwei Zeng Nanjing University of Aeronautics and Astronautics, Yixuan Tang Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Weiwei Li , Zhiqiu Huang Nanjing University of Aeronautics and Astronautics | ||
| 09:4515m Full-paper | Accelerating Static Null Pointer Dereference Detection with Parallel Computing Research Track Rulin Xu National University of Defense Technology, Xiaoguang Mao National University of Defense Technology, Haifang Zhou National University of Defense Technology, Luohui Chen National University of Defense Technology, Ruyi Zhang , Yuanliang Zhang , Wei Xiao  | ||
| 10:00 - 11:00 | Session 5: Software Modeling and DevelopmentResearch Track at Main Conference Room Chair(s): Jingxuan Zhang Nanjing University of Aeronautics and Astronautics | ||
| 10:0015m Full-paper | A Scenario Model-driven Task Planning Method for Unmanned Aerial Vehicle Swarm Research Track Yunwei Dong Northwestern Polytechnical University, School of Computer Science and Engineering, Zeshan Li , Ruiheng Zhang , Rubing Huang Macau University of Science and Technology (M.U.S.T.), Tao Wang  | ||
| 10:1515m Full-paper | DSL-MoLab: supporting model-based development of TDL-specific systems enabled by DSL Research Track Jie Hu , Yaozhong Zhang , Xiujuan Qin , Lvlun Wei , Fangwe Chen , Shmuel Tyszberowicz The Academic College of Tel-Aviv Yaffo, Mingyue Zhang Southwest University, Bo Liu Southwest University | ||
| 10:3015m Full-paper | Synthesizing Controller for Unsynthesizable Specification Based on Criticality Levels Research Track | ||
| 10:4515m Full-paper | CLUE: Customizing clustering techniques using machine learning for software modularization Research Track Fanyi Meng , Ying Wang Northeastern University, Chun Yong Chong Monash University Malaysia, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China | ||
| 11:00 - 11:20 | |||
| 11:20 - 12:20 | Session 6: Code Generation and TransformationResearch Track at Main Conference Room Chair(s): Jialun Cao Hong Kong University of Science and Technology | ||
| 11:2015m Full-paper | RepoMinCoder: Improving Repository-Level Code Generation Based on Information Loss Screening Research Track Yifan Li , Ensheng Shi Xi’an Jiaotong University, Dewu Zheng , Kefeng Duan , Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University | ||
| 11:3515m Full-paper | Murphi2Chisel: A Protocol Compiler from Murphi to Chisel Research Track Cai Zhenghai , Yongjian Li Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China, Yongxin Zhao  | ||
| 11:5015m Full-paper | CCAF: Learning Code Change via AdapterFusion Research Track Wentao Zou , Zongwen Shen , Jidong Ge Nanjing University, Chuanyi Li Nanjing University, Bin Luo Nanjing University | ||
| 12:0515m Full-paper | ExceRef: Automatically Refactoring for Exception Handling Research Track | ||
| 12:20 - 14:30 | |||
| 15:30 - 15:50 | |||
| 18:30 - 21:00 | |||
Fri 26 JulDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Fri 26 Jul
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
| 09:00 - 10:00 | Session 9: System Performance and Resource ManagementResearch Track at Main Conference Room Chair(s): Ming Fan Xi'an Jiaotong University | ||
| 09:0015m Full-paper | IOGuard: Software-Based I/O Page Fault Handling with One CPU Core Research Track | ||
| 09:1515m Full-paper | Global-State Aware Automatic NUMA Balancing Research Track | ||
| 09:3015m Full-paper | Resource-Aware Task Allocation on Mixed-Criticality Systems: a Task-Splitting Approach Research Track | ||
| 09:4515m Full-paper | Parer: Boosting EROFS Image Creation With Parallelism and Reproducibility Research Track | ||
| 10:00 - 11:00 | Session 10: Software Reliability and MaintenanceResearch Track at Main Conference Room Chair(s): Rubing Huang Macau University of Science and Technology (M.U.S.T.) | ||
| 10:0015m Full-paper | Developing Burr-XII NHPP-based software reliability growth model using Expectation Conditional Maximization Algorithm Research Track Sheng Han North Minzu University, Qiang Han North Minzu University, Yixin Qiao North Minzu University, Kehan Xue North Minzu University, Zhichao Shi North Minzu University | ||
| 10:1515m Full-paper | ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java Research Track Yi Hou Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhijun Wang , Liuming Wang , Shuguang Chen , Yihan Wang , Lei Sang , Haijun Wang Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
| 10:3015m Full-paper | Mining Fix Patterns for System Interaction Bugs Research Track di liu , Yanyan Yan Nanjing University, Hongcheng Fan Nanjing University, Yang Feng Nanjing University | ||
| 10:4515m Full-paper | Towards Life-long Software Self-validation in Production Research Track | ||
| 11:00 - 11:20 | |||
| 11:20 - 12:20 | Session 11: Anomaly Detection and SecurityResearch Track at Main Conference Room Chair(s): Yang Feng Nanjing University | ||
| 11:2015m Full-paper | LSTD-MTS: Anomaly Detection with Capturing Long-Term Spatio-Temporal Dependence for Multi-dimensional Time Series Research Track | ||
| 11:3515m Full-paper | CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP Research Track | ||
| 11:5015m Full-paper | A Bayesian LSTM Based Active Anomaly Detection Service for Large Online Systems Research Track | ||
| 12:0515m Full-paper | LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes Research Track Xiaoyu Yi , Guolei Li Shanghai Jiao Tong University, Wenkai Huang Shanghai Jiao Tong University, Xi Lin Shanghai Jiao Tong University, Jianhua Li Shanghai JiaoTong University, Yuchen Liu North Carolina State University | ||
| 12:20 - 14:30 | |||
| 14:30 - 15:45 | Session 12: Emerging Technologies and ApplicationsResearch Track at Main Conference Room Chair(s): Jiachi Chen Sun Yat-sen University | ||
| 14:3015m Full-paper | An Exploratory Study on God Header Files in Open-Source C Projects Research Track | ||
| 14:4515m Full-paper | Reduce Detection Latency of YOLOv5 to Prevent Real-Time Tracking Failures for Lightweight Robots Research Track | ||
| 15:0015m Full-paper | Efficient Deadlock Detection in MPI Programs with Path Compression and Focus Matching Research Track | ||
| 15:1515m Full-paper | Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain Research Track | ||
| 15:3015m Full-paper | The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading Research Track Shijian Chen , Jiachi Chen Sun Yat-sen University, Jiangshan Yu Monash University, Xiapu Luo The Hong Kong Polytechnic University, Yanlin Wang Sun Yat-sen University | ||
| 15:45 - 16:10 | |||
| 17:10 - 17:30 | |||
| 17:1020m Day closing | Closing Research Track | ||