ISSTA 2022 Program
Mon 18 JulDisplayed time zone: Seoul change
15:00 - 18:00 | Main SessionAISTA at AISTA Chair(s): Lei Ma University of Alberta, Shuai Wang Hong Kong University of Science and Technology, Xiaofei Xie Singapore Management University, Singapore | ||
16:10 50mKeynote | Neural Network Fairness: Verification and Repair AISTA Jun Sun Singapore Management University | ||
17:00 20mTalk | A tool support for bug triage automation AISTA | ||
17:20 20mTalk | TEESlice: Slicing DNN Models for Secure and Efficient Deployment AISTA Ziqi Zhang Peking University, Yifeng Cai , Yao Guo Peking University, Bingyan Liu Peking University, Ding Li Peking University, Lucien K. L. Ng , Xiangqun Chen Peking University | ||
17:40 20mTalk | Test Case Prioritization based on Neural Networks Classification AISTA |
Tue 19 JulDisplayed time zone: Seoul change
00:30 - 00:45 | |||
00:30 15mDay opening | Opening Doctoral Symposium |
00:45 - 01:15 | |||
00:45 30mTalk | Publishing strategies Doctoral Symposium Alex Orso Georgia Institute of Technology |
01:15 - 01:45 | |||
01:15 30mTalk | After graduation: academia vs industry Doctoral Symposium |
01:45 - 02:45 | |||
01:45 60mTalk | PhD advice panel discussion Doctoral Symposium Marcelo d'Amorim Federal University of Pernambuco, Wing Lam University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign, Xusheng Xiao Case Western Reserve University, Wei Yang University of Texas at Dallas |
02:45 - 03:00 | |||
02:45 15mDay closing | Closing Doctoral Symposium |
04:00 - 05:00 | AmazonSponsors at Sponsors Our applied scientists work at the intersection of theory and practice to drive scientific innovation and provide value for our customers. AWS Automated Reasoning teams are responsible for delivering tools that are called billions of times daily. Amazon development teams are integrating automated reasoning tools such as Dafny, P, and SAW into their development processes, raising the bar on the security, durability, availability, and quality of our products. AWS Automated Reasoning teams are changing how computer systems built on top of the cloud are built and operated. | ||
04:00 60m | Amazon Sponsors |
10:00 - 11:00 | KRAFTONSponsors at Sponsors KRAFTON, creators of Player Unknown’s Battlegrounds(PUBG), provides a unique environment for researchers to collaborate with top tier engineers from AAA game makers to apply their academic findings to real-world products. We welcome you to join us and learn about ongoing deep learning research projects in KRAFTON to create virtual friend, and related opportunities (job, internship and academic collaboration). | ||
10:00 60m | KRAFTON Sponsors |
15:00 - 16:00 | MicrosoftSponsors at Sponsors Microsoft Research (MSR) provides a dynamic environment for research careers with a network of world-class research labs led by globally recognized research scientists and engineers. You are welcome to join this session to learn about the opportunities (job, internship, and academic collaboration) in MSR. | ||
15:00 60m | Microsoft Sponsors |
Wed 20 JulDisplayed time zone: Seoul change
00:00 - 01:00 | |||
00:00 60mTalk | Neural Software Analysis: the Good, the Bad, and the Ugly Keynotes Michael Pradel University of Stuttgart |
01:20 - 02:40 | |||
01:20 20mTalk | Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper Technical Papers DOI | ||
01:40 20mTalk | Evolution-Aware Detection of Order-Dependent Flaky Tests Technical Papers DOI | ||
02:00 20mTalk | jTrans: Jump-Aware Transformer for Binary Code Similarity Detection Technical Papers Hao Wang Tsinghua University, Wenjie Qu Huazhong University of Science and Technology, Gilad Katz Ben-Gurion University of the Negev, Wenyu Zhu Tsinghua University, Zeyu Gao University of Science and Technology of China, Han Qiu Tsinghua University, Jianwei Zhuge Tsinghua University, Chao Zhang Tsinghua University DOI Pre-print | ||
02:20 20mTalk | On the Use of Evaluation Measures for Defect Prediction Studies Technical Papers DOI |
01:20 - 02:20 | Session 1-2: Test Generation and Mutation ATechnical Papers at ISSTA 2 Chair(s): Raghavan Komondoor IISc Bengaluru | ||
01:20 20mTalk | On the Use of Mutation Analysis For Evaluating Student Test Suite Quality Technical Papers James Perretta Northeastern University, Andrew DeOrio University of Michigan, Arjun Guha Northeastern University, Jonathan Bell Northeastern University DOI | ||
01:40 20mTalk | Automated Test Generation for REST APIs: No Time to Rest Yet Technical Papers DOI | ||
02:00 20mTalk | One Step Further: Evaluating Interpreters Using Metamorphic Testing Technical Papers Ming Fan Xi'an Jiaotong University, Jiali Wei Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhou Xu Wuhan University, Wenying Wei Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University DOI |
03:00 - 04:00 | |||
03:00 20mTalk | Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper) Technical Papers Jialu Zhang Yale University, Todd Mytkowicz Microsoft Research, Mike Kaufman Microsoft Corporation, Ruzica Piskac Yale University, Shuvendu K. Lahiri Microsoft Research DOI | ||
03:20 20mTalk | Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing Technical Papers Hasan Ferit Eniser MPI-SWS, Timo P. Gros Saarland University, Germany, Valentin Wüstholz ConsenSys, Jörg Hoffmann Saarland University and DFKI, Germany, Maria Christakis MPI-SWS DOI Pre-print | ||
03:40 20mTalk | An Extensive Study on Pre-trained Models for Program Understanding and Generation Technical Papers Zhengran Zeng Southern University of Science and Technology, Hanzhuo Tan Southern University of Science and Technology, The Hong Kong Polytechnic University, Haotian Zhang , Jing Li The Hong Kong Polytech University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign DOI |
03:00 - 04:00 | |||
03:00 20mTalk | eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts Technical Papers Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Karthik Pattabiraman University of British Columbia DOI | ||
03:20 20mTalk | Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution Technical Papers Peilin Zheng Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University DOI | ||
03:40 20mTalk | WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts Technical Papers Weimin Chen The Hong Kong Polytechnic University, Zihan Sun Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Haipeng Cai Washington State University, USA, Lei Wu Zhejiang University DOI |
04:00 - 05:00 | VPlusLab Inc.Sponsors at Sponsors VPlusLab Inc. was founded by the KAIST professors who have developed automated software testing/debugging techniques with industries for 20 years. To improve software quality and reliability cost-effectively, we provide automated software testing tools, training, and services. We welcome you to join us and learn about VPlusLab Inc. (https://vpluslab.kr) and its automated unit testing tool CROWN 2.0 (https://vpluslab.kr/crown2). See also this video about VPlusLab Inc. | ||
04:00 60m | VPlusLab Inc. Sponsors |
07:00 - 08:20 | Session 2-1: Oracles, Models, and Measurement ETechnical Papers at ISSTA 1 Chair(s): Christoph Csallner University of Texas at Arlington | ||
07:00 20mTalk | On the Use of Evaluation Measures for Defect Prediction Studies Technical Papers DOI | ||
07:20 20mTalk | Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper Technical Papers DOI | ||
07:40 20mTalk | Evolution-Aware Detection of Order-Dependent Flaky Tests Technical Papers DOI | ||
08:00 20mTalk | FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases Technical Papers DOI Pre-print |
07:00 - 08:20 | |||
07:00 20mTalk | Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper Technical Papers Zhiming Li Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Singapore, Haoliang Li City University of Hong Kong, Zhengzi Xu Nanyang Technological University, Yi Li Nanyang Technological University, Yang Liu Nanyang Technological University DOI | ||
07:20 20mTalk | DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions Technical Papers Danning Xie Purdue University, Yitong Li University of Waterloo, Mijung Kim UNIST, Hung Viet Pham University of Waterloo, Lin Tan Purdue University, Xiangyu Zhang Purdue University, Michael W. Godfrey University of Waterloo, Canada DOI | ||
07:40 20mTalk | HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models Technical Papers DOI | ||
08:00 20mTalk | Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs Technical Papers Charaka Geethal Monash University, Thuan Pham The University of Melbourne, Aldeida Aleti Monash University, Marcel Böhme MPI-SP, Germany and Monash University, Australia DOI Pre-print |
08:40 - 09:40 | |||
08:40 20mTalk | TELL: Log Level Suggestions via Modeling Multi-level Code Block Information Technical Papers Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore DOI | ||
09:00 20mTalk | Hunting Bugs with Accelerated Optimal Graph Vertex Matching Technical Papers Xiaohui Zhang Renmin University of China, Yuanjun Gong Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wei You Renmin University of China, Wenchang Shi Renmin University of China, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI | ||
09:20 20mTalk | Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper) Technical Papers Jialu Zhang Yale University, Todd Mytkowicz Microsoft Research, Mike Kaufman Microsoft Corporation, Ruzica Piskac Yale University, Shuvendu K. Lahiri Microsoft Research DOI |
08:40 - 09:40 | |||
08:40 20mTalk | ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems Technical Papers Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Zhenyu Chen Nanjing University DOI | ||
09:00 20mTalk | BET: Black-box Efficient Testing for Convolutional Neural Networks Technical Papers Wang Jialai Tsinghua University, Han Qiu Tsinghua University, Yi Rong Tsinghua University, Hengkai Ye Purdue University, Qi Li Tsinghua University, Zongpeng Li Tsinghua University, Chao Zhang Tsinghua University DOI | ||
09:20 20mTalk | Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment Technical Papers Geunwoo Kim University of California, Irvine, USA, Sanghyun Hong Oregon State University, Michael Franz University of California, Irvine, Dokyung Song Yonsei University, South Korea DOI |
10:00 - 11:00 | Session 2-5: Android BTechnical Papers at ISSTA 1 Chair(s): Christoph Csallner University of Texas at Arlington | ||
10:00 20mTalk | Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study) Technical Papers Pei Liu Monash University, Yanjie Zhao Monash University, Haipeng Cai Washington State University, USA, Mattia Fazzini University of Minnesota, John Grundy Monash University, Li Li Monash University DOI | ||
10:20 20mTalk | PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications Technical Papers Shuaihao Yang Nanjing University of Science and Technology, Zigang Zeng Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI | ||
10:40 20mTalk | Detecting and Fixing Data Loss Issues in Android Apps Technical Papers Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University DOI |
10:00 - 10:40 | |||
10:00 20mTalk | Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems Technical Papers Ziyuan Zhong Columbia University, Zhisheng Hu Baidu Security, Shengjian Guo Baidu Security, Xinyang Zhang Baidu Security, Zhenyu Zhong Baidu USA, Baishakhi Ray Columbia University DOI | ||
10:20 20mTalk | Deadlock Prediction via Generalized Dependency Technical Papers Jinpeng Zhou University of Pittsburgh, Hanmei Yang University of Massachusetts Amherst, John Lange Oak Ridge National Lab/University of Pittsburgh, Tongping Liu University of Massachusetts at Amherst DOI |
15:00 - 16:00 | |||
15:00 60mTalk | Neural Software Analysis: the Good, the Bad, and the Ugly Keynotes Michael Pradel University of Stuttgart |
16:20 - 17:40 | Session 3-1: Static Analysis and Specifications Testing CTechnical Papers at ISSTA 1 Chair(s): Ding Li Peking University | ||
16:20 20mTalk | A Large-scale Study of Usability Criteria addressed by Static Analysis Tools Technical Papers Marcus Nachtigall Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institute, Paderborn University, Eric Bodden University of Paderborn; Fraunhofer IEM DOI | ||
16:40 20mTalk | An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection Technical Papers Stephan Lipp Technical University of Munich, Sebastian Banescu Technical University of Munich, Alexander Pretschner TU Munich DOI Pre-print | ||
17:00 20mTalk | Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper) Technical Papers Frank Busse Imperial College London, Pritam Gharat Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London DOI Pre-print | ||
17:20 20mTalk | Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection Technical Papers Xiao Cheng University of Technology Sydney, Guanqin Zhang University of Technology Sydney, Haoyu Wang Huazhong University of Science and Technology, China, Yulei Sui University of New South Wales DOI |
16:20 - 17:20 | Session 3-2: Fuzzing and Friends CTechnical Papers at ISSTA 2 Chair(s): Behnaz Hassanshahi Oracle Labs, Australia | ||
16:20 20mTalk | SnapFuzz: High-Throughput Fuzzing of Network Applications Technical Papers DOI | ||
16:40 20mTalk | SLIME: Program-sensitive Energy Allocation for Fuzzing Technical Papers Chenyang Lyu Zhejiang University, Hong Liang Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Binbin Zhao Georgia Institute of Technology, Meng Han Binjiang Institute of Zhejiang University & Zhejiang University, Yun Li Huawei Technologies Co., Ltd., Zhe Wang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology DOI | ||
17:00 20mTalk | Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs Technical Papers DOI |
18:00 - 19:00 | Session 3-3: Test Generation and Mutation CTechnical Papers at ISSTA 1 Chair(s): Stefan Winter LMU Munich | ||
18:00 20mTalk | One Step Further: Evaluating Interpreters Using Metamorphic Testing Technical Papers Ming Fan Xi'an Jiaotong University, Jiali Wei Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhou Xu Wuhan University, Wenying Wei Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University DOI | ||
18:20 20mTalk | Test Mimicry to Assess the Exploitability of Library Vulnerabilities Technical Papers Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Xuan Bach D. Le The University of Melbourne, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, David Lo Singapore Management University DOI | ||
18:40 20mTalk | RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History Technical Papers Xuezhi Song Fudan University, Yun Lin National University of Singapore, Siang Hwee Ng National University of Singapore, Yijian Wu Fudan University, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University DOI Pre-print |
18:00 - 19:00 | |||
18:00 20mTalk | Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation Technical Papers Yaowen Zheng Nanyang Technological University; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China;, Yuekang Li Nanyang Technological University, Cen Zhang Nanyang Technological University, Hongsong Zhu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University, Limin Sun Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China DOI | ||
18:20 20mTalk | MDPFuzz: Testing Models Solving Markov Decision Processes Technical Papers Qi Pang HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology DOI | ||
18:40 20mTalk | PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation Technical Papers Zheyu Ma , Bodong Zhao Tsinghua University, Letu Ren Department of Computer Science and Technology, Tsinghua University, Zheming Li Tsinghua University, Siqi Ma the University of Queensland, Xiapu Luo Hong Kong Polytechnic University, Chao Zhang Tsinghua University DOI |
Thu 21 JulDisplayed time zone: Seoul change
00:00 - 01:00 | |||
00:00 60mTalk | Software Developer Tools for Democratizing Heterogeneous Computing Applications Keynotes Miryung Kim University of California at Los Angeles, USA |
01:20 - 02:00 | |||
01:20 20mTalk | Testing Dafny (Experience Paper) Technical Papers Ahmed Irfan Amazon Web Services, Sorawee Porncharoenwase University of Washington, Zvonimir Rakamaric Amazon Web Services, Neha Rungta Amazon Web Services, Emina Torlak Amazon Web Services DOI | ||
01:40 20mTalk | The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper Technical Papers Ingkarat Rak-amnouykit Rensselaer Polytechnic Institute, Ana Milanova Rensselaer Polytechnic Institute, Guillaume Baudart Inria; ENS; PSL University, Martin Hirzel IBM Research, Julian Dolby IBM Research, USA DOI |
01:20 - 02:20 | |||
01:20 20mTalk | A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware Technical Papers Binbin Zhao Georgia Institute of Technology, Shouling Ji Zhejiang University, Jiacheng Xu Zhejiang University, Yuan Tian University of Virginia, Qiuyang Wei Zhejiang University, Qinying Wang Zhejiang University, Chenyang Lyu Zhejiang University, Xuhong Zhang Zhejiang University, Changting Lin Binjiang Institute of Zhejiang University, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Raheem Beyah Georgia Institute of Technology DOI | ||
01:40 20mTalk | Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems Technical Papers Ziyuan Zhong Columbia University, Zhisheng Hu Baidu Security, Shengjian Guo Baidu Security, Xinyang Zhang Baidu Security, Zhenyu Zhong Baidu USA, Baishakhi Ray Columbia University DOI | ||
02:00 20mTalk | Understanding Device Integration Bugs in Smart Home System Technical Papers Tao Wang , Kangkang Zhang Institute of Software Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences DOI |
03:00 - 04:00 | Session 1-7: Static Analysis and Specifications Testing ATechnical Papers at ISSTA 1 Chair(s): Raghavan Komondoor IISc Bengaluru | ||
03:00 20mTalk | A Large-scale Study of Usability Criteria addressed by Static Analysis Tools Technical Papers Marcus Nachtigall Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institute, Paderborn University, Eric Bodden University of Paderborn; Fraunhofer IEM DOI | ||
03:20 20mTalk | An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection Technical Papers Stephan Lipp Technical University of Munich, Sebastian Banescu Technical University of Munich, Alexander Pretschner TU Munich DOI Pre-print | ||
03:40 20mTalk | Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper) Technical Papers Frank Busse Imperial College London, Pritam Gharat Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London DOI Pre-print |
03:00 - 03:40 | |||
03:00 20mTalk | Deadlock Prediction via Generalized Dependency Technical Papers Jinpeng Zhou University of Pittsburgh, Hanmei Yang University of Massachusetts Amherst, John Lange Oak Ridge National Lab/University of Pittsburgh, Tongping Liu University of Massachusetts at Amherst DOI | ||
03:20 20mTalk | Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning Technical Papers Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China DOI |
07:00 - 08:00 | Session 2-7: Test Generation and Mutation BTechnical Papers at ISSTA 1 Chair(s): Christoph Csallner University of Texas at Arlington | ||
07:00 20mTalk | Automated Test Generation for REST APIs: No Time to Rest Yet Technical Papers DOI | ||
07:20 20mTalk | On the Use of Mutation Analysis For Evaluating Student Test Suite Quality Technical Papers James Perretta Northeastern University, Andrew DeOrio University of Michigan, Arjun Guha Northeastern University, Jonathan Bell Northeastern University DOI | ||
07:40 20mTalk | Test Mimicry to Assess the Exploitability of Library Vulnerabilities Technical Papers Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Xuan Bach D. Le The University of Melbourne, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, David Lo Singapore Management University DOI |
07:00 - 08:00 | |||
07:00 20mTalk | A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware Technical Papers Binbin Zhao Georgia Institute of Technology, Shouling Ji Zhejiang University, Jiacheng Xu Zhejiang University, Yuan Tian University of Virginia, Qiuyang Wei Zhejiang University, Qinying Wang Zhejiang University, Chenyang Lyu Zhejiang University, Xuhong Zhang Zhejiang University, Changting Lin Binjiang Institute of Zhejiang University, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Raheem Beyah Georgia Institute of Technology DOI | ||
07:20 20mTalk | Automated Testing of Image Captioning Systems Technical Papers BoXi Yu The Chinese University of Hong Kong, Shenzhen, Zhiqing Zhong South China University of Technology, Xinran Qin South China University of Technology, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuancheng Wang The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen DOI | ||
07:40 20mTalk | LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems Technical Papers DOI |
08:40 - 09:40 | |||
08:40 20mTalk | Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing Technical Papers Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yicheng Wang Institute of Software Chinese Academy of Sciences, Zheng Qin Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
09:00 20mTalk | RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History Technical Papers Xuezhi Song Fudan University, Yun Lin National University of Singapore, Siang Hwee Ng National University of Singapore, Yijian Wu Fudan University, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University DOI Pre-print | ||
09:20 20mTalk | Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis Technical Papers Zhiyong Wu Tsinghua University, China, Jie Liang School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University DOI |
08:40 - 09:40 | Session 2-10: Static Analysis and Specifications Testing BTechnical Papers at ISSTA 2 Chair(s): Behnaz Hassanshahi Oracle Labs, Australia | ||
08:40 20mTalk | Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection Technical Papers Xiao Cheng University of Technology Sydney, Guanqin Zhang University of Technology Sydney, Haoyu Wang Huazhong University of Science and Technology, China, Yulei Sui University of New South Wales DOI | ||
09:00 20mTalk | Testing Dafny (Experience Paper) Technical Papers Ahmed Irfan Amazon Web Services, Sorawee Porncharoenwase University of Washington, Zvonimir Rakamaric Amazon Web Services, Neha Rungta Amazon Web Services, Emina Torlak Amazon Web Services DOI | ||
09:20 20mTalk | The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper Technical Papers Ingkarat Rak-amnouykit Rensselaer Polytechnic Institute, Ana Milanova Rensselaer Polytechnic Institute, Guillaume Baudart Inria; ENS; PSL University, Martin Hirzel IBM Research, Julian Dolby IBM Research, USA DOI |
10:00 - 11:00 | |||
10:00 5mTalk | ATUA: an Update-driven App Testing Tool Tool Demonstrations Chanh-Duc Ngo University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa DOI | ||
10:05 5mTalk | Automatic Generation of Smoke Test Suites for Kubernetes Tool Demonstrations DOI | ||
10:10 5mTalk | ESBMC-CHERI: Towards Verification of C Programs for CHERI Platforms with ESBMC Tool Demonstrations Franz Brausse The University of Manchester, Fedor Shmarov The University of Manchester, Rafael Menezes University of Manchester, Mikhail R. Gadelha Igalia, Konstantin Korovin University of Manchester, Giles Reger University of Manchester, Lucas C. Cordeiro University of Manchester DOI | ||
10:16 5mTalk | ESBMC-Jimple: Verifying Kotlin Programs via Jimple Intermediate Representation Tool Demonstrations Rafael Menezes University of Manchester, Rosiane de Freitas Federal University of Amazonas, Daniel Moura Federal University of Amazonas, Helena Cavalcante Federal University of Amazonas, Lucas C. Cordeiro University of Manchester DOI | ||
10:21 5mTalk | Faster Mutation Analysis with MeMu Tool Demonstrations DOI | ||
10:27 5mTalk | iFixDataloss: A Tool for Detecting and Fixing Data Loss Issues in Android Apps Tool Demonstrations Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University DOI | ||
10:32 5mTalk | Maestro: A Platform for Benchmarking Automatic Program Repair Tools on Software Vulnerabilities Tool Demonstrations Eduard Costel Pinconschi Instituto Superior Técnico, University of Lisboa & INESC-ID, Quang-Cuong Bui Hamburg University of Technology, Rui Abreu Faculty of Engineering, University of Porto, Portugal, Pedro Adão IST-ULisboa and Instituto de Telecomunicações, Riccardo Scandariato Hamburg University of Technology DOI | ||
10:38 5mTalk | Pytest-Smell: A smell detection tool for Python unit tests Tool Demonstrations Alexandru Bodea Student at Babes Bolay University - Faculty of Mathematics and Computer Science DOI | ||
10:43 5mTalk | QMutPy: A Mutation Testing Tool for Quantum Algorithms & Applications in Qiskit Tool Demonstrations Daniel Fortunato INESC-ID, University of Porto, José Campos Faculty of Engineering of University of Porto & LASIGE, Portugal, Rui Abreu Faculty of Engineering, University of Porto, Portugal DOI | ||
10:49 5mTalk | SpecChecker-ISA: A Data Sharing Analyzer for Interrupt-driven Embedded Software Tool Demonstrations Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China DOI | ||
10:54 5mTalk | UniRLTest: Universal Platform-Independent Testing with Reinforcement Learning via Image Understanding Tool Demonstrations Ziqian Zhang Nanjing University, Yulei Liu Nanjing University, Shengcheng Yu Nanjing University, Xin Li Nanjing University, Yexiao Yun Nanjing University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University DOI |
15:00 - 16:00 | |||
15:00 60mTalk | Software Developer Tools for Democratizing Heterogeneous Computing Applications Keynotes Miryung Kim University of California at Los Angeles, USA |
16:20 - 17:40 | Session 3-5: Concurrency, IoT, Embedded CTechnical Papers at ISSTA 1 Chair(s): Stefan Winter LMU Munich | ||
16:20 20mTalk | Understanding Device Integration Bugs in Smart Home System Technical Papers Tao Wang , Kangkang Zhang Institute of Software Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences DOI | ||
16:40 20mTalk | Automated Testing of Image Captioning Systems Technical Papers BoXi Yu The Chinese University of Hong Kong, Shenzhen, Zhiqing Zhong South China University of Technology, Xinran Qin South China University of Technology, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuancheng Wang The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen DOI | ||
17:00 20mTalk | LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems Technical Papers DOI | ||
17:20 20mTalk | Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning Technical Papers Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China DOI |
16:20 - 17:40 | |||
16:20 20mTalk | AEON: A Method for Automatic Evaluation of NLP Test Cases Technical Papers Jen-tse Huang The Chinese University of Hong Kong, Jianping Zhang The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong DOI | ||
16:40 20mTalk | HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models Technical Papers DOI | ||
17:00 20mTalk | Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment Technical Papers Geunwoo Kim University of California, Irvine, USA, Sanghyun Hong Oregon State University, Michael Franz University of California, Irvine, Dokyung Song Yonsei University, South Korea DOI | ||
17:20 20mTalk | Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs Technical Papers Charaka Geethal Monash University, Thuan Pham The University of Melbourne, Aldeida Aleti Monash University, Marcel Böhme MPI-SP, Germany and Monash University, Australia DOI Pre-print |
18:00 - 18:40 | |||
18:00 20mTalk | Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing Technical Papers Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yicheng Wang Institute of Software Chinese Academy of Sciences, Zheng Qin Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
18:20 20mTalk | Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis Technical Papers Zhiyong Wu Tsinghua University, China, Jie Liang School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University DOI |
18:00 - 18:40 | |||
18:00 20mTalk | CIRCLE: Continual Repair across Programming Languages Technical Papers Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland DOI | ||
18:20 20mTalk | Program Vulnerability Repair via Inductive Inference Technical Papers Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore DOI |
23:00 - 23:15 | |||
23:00 15mTalk | Award Presentations & Chair Report Keynotes |
23:15 - 00:00 | |||
23:15 45mTalk | Probabilistic Symbolic Execution: Quantitative Program Analysis through Model Counting Keynotes Jaco Geldenhuys University of Stellenbosch, South Africa, Matthew B Dwyer University of Virginia, Willem Visser Stellenbosch University DOI |
Fri 22 JulDisplayed time zone: Seoul change
00:00 - 01:00 | |||
00:00 20mTalk | Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs Technical Papers DOI | ||
00:20 20mTalk | MDPFuzz: Testing Models Solving Markov Decision Processes Technical Papers Qi Pang HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology DOI | ||
00:40 20mTalk | SnapFuzz: High-Throughput Fuzzing of Network Applications Technical Papers DOI |
00:00 - 01:00 | |||
00:00 20mTalk | AEON: A Method for Automatic Evaluation of NLP Test Cases Technical Papers Jen-tse Huang The Chinese University of Hong Kong, Jianping Zhang The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong DOI | ||
00:20 20mTalk | Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study) Technical Papers DOI Pre-print | ||
00:40 20mTalk | ε-weakened Robustness of Deep Neural Networks Technical Papers Pei Huang State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Yuting Yang Institute of Computing Technology,Chinese Academy of Sciences; University of Chinese Academy of Sciences, Minghao Liu Institute of Software, Chinese Academy of Sciences, Fuqi Jia State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI |
01:40 - 02:20 | |||
01:40 20mTalk | Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation Technical Papers Yaowen Zheng Nanyang Technological University; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China;, Yuekang Li Nanyang Technological University, Cen Zhang Nanyang Technological University, Hongsong Zhu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University, Limin Sun Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China DOI | ||
02:00 20mTalk | TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving Technical Papers Xuwei Liu Purdue University, USA, Wei You Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI |
01:40 - 02:20 | |||
01:40 20mTalk | Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper Technical Papers Zhiming Li Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Singapore, Haoliang Li City University of Hong Kong, Zhengzi Xu Nanyang Technological University, Yi Li Nanyang Technological University, Yang Liu Nanyang Technological University DOI | ||
02:00 20mTalk | DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions Technical Papers Danning Xie Purdue University, Yitong Li University of Waterloo, Mijung Kim UNIST, Hung Viet Pham University of Waterloo, Lin Tan Purdue University, Xiangyu Zhang Purdue University, Michael W. Godfrey University of Waterloo, Canada DOI |
03:00 - 03:40 | |||
03:00 20mTalk | ATR: Template-based Repair for Alloy Specifications Technical Papers Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln DOI | ||
03:20 20mTalk | Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code Technical Papers DOI Pre-print |
03:00 - 03:40 | Session 1-14: Android ATechnical Papers at ISSTA 2 Chair(s): Christoph Csallner University of Texas at Arlington | ||
03:00 20mTalk | Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android Technical Papers Yifei Lu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Xuandong Li Nanjing University DOI | ||
03:20 20mTalk | NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper Technical Papers Hao Zhou The Hong Kong Polytechnic University, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Ting Wang Pennsylvania State University, Yajin Zhou Zhejiang University, Chao Zhang Tsinghua University, Haipeng Cai Washington State University, USA DOI |
07:00 - 08:00 | |||
07:00 20mTalk | PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation Technical Papers Zheyu Ma , Bodong Zhao Tsinghua University, Letu Ren Department of Computer Science and Technology, Tsinghua University, Zheming Li Tsinghua University, Siqi Ma the University of Queensland, Xiapu Luo Hong Kong Polytechnic University, Chao Zhang Tsinghua University DOI | ||
07:20 20mTalk | SLIME: Program-sensitive Energy Allocation for Fuzzing Technical Papers Chenyang Lyu Zhejiang University, Hong Liang Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Binbin Zhao Georgia Institute of Technology, Meng Han Binjiang Institute of Zhejiang University & Zhejiang University, Yun Li Huawei Technologies Co., Ltd., Zhe Wang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology DOI | ||
07:40 20mTalk | TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving Technical Papers Xuwei Liu Purdue University, USA, Wei You Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI |
07:00 - 08:20 | Session 2-14: Program Repair BTechnical Papers at ISSTA 2 Chair(s): Christoph Csallner University of Texas at Arlington | ||
07:00 20mTalk | ATR: Template-based Repair for Alloy Specifications Technical Papers Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln DOI | ||
07:20 20mTalk | CIRCLE: Continual Repair across Programming Languages Technical Papers Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland DOI | ||
07:40 20mTalk | Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code Technical Papers DOI Pre-print | ||
08:00 20mTalk | Program Vulnerability Repair via Inductive Inference Technical Papers Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore DOI |
08:40 - 09:40 | |||
08:40 20mTalk | eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts Technical Papers Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Karthik Pattabiraman University of British Columbia DOI | ||
09:00 20mTalk | Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper Technical Papers Ye Liu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Shang-Wei Lin Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden DOI Pre-print | ||
09:20 20mTalk | SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability Technical Papers Zeqin Liao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiao Chen Sun Yat-sen University, Yuhong Nan Sun Yat-sen University DOI |
15:00 - 16:20 | |||
15:00 20mTalk | Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper Technical Papers Ye Liu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Shang-Wei Lin Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden DOI Pre-print | ||
15:20 20mTalk | Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution Technical Papers Peilin Zheng Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University DOI | ||
15:40 20mTalk | SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability Technical Papers Zeqin Liao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiao Chen Sun Yat-sen University, Yuhong Nan Sun Yat-sen University DOI | ||
16:00 20mTalk | WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts Technical Papers Weimin Chen The Hong Kong Polytechnic University, Zihan Sun Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Haipeng Cai Washington State University, USA, Lei Wu Zhejiang University DOI |
15:00 - 16:20 | |||
15:00 20mTalk | ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems Technical Papers Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Zhenyu Chen Nanjing University DOI | ||
15:20 20mTalk | BET: Black-box Efficient Testing for Convolutional Neural Networks Technical Papers Wang Jialai Tsinghua University, Han Qiu Tsinghua University, Yi Rong Tsinghua University, Hengkai Ye Purdue University, Qi Li Tsinghua University, Zongpeng Li Tsinghua University, Chao Zhang Tsinghua University DOI | ||
15:40 20mTalk | Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study) Technical Papers DOI Pre-print | ||
16:00 20mTalk | ε-weakened Robustness of Deep Neural Networks Technical Papers Pei Huang State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Yuting Yang Institute of Computing Technology,Chinese Academy of Sciences; University of Chinese Academy of Sciences, Minghao Liu Institute of Software, Chinese Academy of Sciences, Fuqi Jia State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI |
16:40 - 17:40 | |||
16:40 20mTalk | An Extensive Study on Pre-trained Models for Program Understanding and Generation Technical Papers Zhengran Zeng Southern University of Science and Technology, Hanzhuo Tan Southern University of Science and Technology, The Hong Kong Polytechnic University, Haotian Zhang , Jing Li The Hong Kong Polytech University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
17:00 20mTalk | Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing Technical Papers Hasan Ferit Eniser MPI-SWS, Timo P. Gros Saarland University, Germany, Valentin Wüstholz ConsenSys, Jörg Hoffmann Saarland University and DFKI, Germany, Maria Christakis MPI-SWS DOI Pre-print | ||
17:20 20mTalk | TELL: Log Level Suggestions via Modeling Multi-level Code Block Information Technical Papers Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore DOI |
16:40 - 17:40 | |||
16:40 20mTalk | Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study) Technical Papers Pei Liu Monash University, Yanjie Zhao Monash University, Haipeng Cai Washington State University, USA, Mattia Fazzini University of Minnesota, John Grundy Monash University, Li Li Monash University DOI | ||
17:00 20mTalk | Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android Technical Papers Yifei Lu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Xuandong Li Nanjing University DOI | ||
17:20 20mTalk | NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper Technical Papers Hao Zhou The Hong Kong Polytechnic University, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Ting Wang Pennsylvania State University, Yajin Zhou Zhejiang University, Chao Zhang Tsinghua University, Haipeng Cai Washington State University, USA DOI |
18:00 - 19:00 | Session 3-13: Oracles, Models, and Measurement FTechnical Papers at ISSTA 1 Chair(s): Stefan Winter LMU Munich | ||
18:00 20mTalk | jTrans: Jump-Aware Transformer for Binary Code Similarity Detection Technical Papers Hao Wang Tsinghua University, Wenjie Qu Huazhong University of Science and Technology, Gilad Katz Ben-Gurion University of the Negev, Wenyu Zhu Tsinghua University, Zeyu Gao University of Science and Technology of China, Han Qiu Tsinghua University, Jianwei Zhuge Tsinghua University, Chao Zhang Tsinghua University DOI Pre-print | ||
18:20 20mTalk | FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases Technical Papers DOI Pre-print | ||
18:40 20mTalk | Hunting Bugs with Accelerated Optimal Graph Vertex Matching Technical Papers Xiaohui Zhang Renmin University of China, Yuanjun Gong Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wei You Renmin University of China, Wenchang Shi Renmin University of China, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI |
18:00 - 18:40 | |||
18:00 20mTalk | Detecting and Fixing Data Loss Issues in Android Apps Technical Papers Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University DOI | ||
18:20 20mTalk | PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications Technical Papers Shuaihao Yang Nanjing University of Science and Technology, Zigang Zeng Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI |