ISSTA 2022
Mon 18 - Fri 22 July 2022 Online
You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 18 Jul

Displayed time zone: Seoul change

15:00 - 18:00
Main SessionAISTA at AISTA
Chair(s): Lei Ma University of Alberta, Shuai Wang Hong Kong University of Science and Technology, Xiaofei Xie Singapore Management University, Singapore
16:10
50m
Keynote
Neural Network Fairness: Verification and Repair
AISTA
Jun Sun Singapore Management University
17:00
20m
Talk
A tool support for bug triage automation
AISTA
Oskar Picus , Camelia Serban Department of Computer Science, Babes-Bolyai University
17:20
20m
Talk
TEESlice: Slicing DNN Models for Secure and Efficient Deployment
AISTA
Ziqi Zhang Peking University, Yifeng Cai , Yao Guo Peking University, Bingyan Liu Peking University, Ding Li Peking University, Lucien K. L. Ng , Xiangqun Chen Peking University
17:40
20m
Talk
Test Case Prioritization based on Neural Networks Classification
AISTA
Cristina-Maria Tiutin , Andreea Vescan Babes-Bolyai University

Tue 19 Jul

Displayed time zone: Seoul change

00:30 - 00:45
00:30
15m
Day opening
Opening
Doctoral Symposium
Aldeida Aleti Monash University, August Shi University of Texas at Austin
00:45 - 01:15
Publishing StrategiesDoctoral Symposium at Doctoral Symposium
00:45
30m
Talk
Publishing strategies
Doctoral Symposium
Alex Orso Georgia Institute of Technology
01:15 - 01:45
After graduation: academia vs industryDoctoral Symposium at Doctoral Symposium
01:15
30m
Talk
After graduation: academia vs industry
Doctoral Symposium
Darko Marinov University of Illinois at Urbana-Champaign, Sai Zhang Google Cloud
01:45 - 02:45
PhD advice panel discussionDoctoral Symposium at Doctoral Symposium
01:45
60m
Talk
PhD advice panel discussion
Doctoral Symposium
Marcelo d'Amorim Federal University of Pernambuco, Wing Lam University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign, Xusheng Xiao Case Western Reserve University, Wei Yang University of Texas at Dallas
02:45 - 03:00
02:45
15m
Day closing
Closing
Doctoral Symposium
Aldeida Aleti Monash University, August Shi University of Texas at Austin
04:00 - 05:00
AmazonSponsors at Sponsors

Our applied scientists work at the intersection of theory and practice to drive scientific innovation and provide value for our customers. AWS Automated Reasoning teams are responsible for delivering tools that are called billions of times daily. Amazon development teams are integrating automated reasoning tools such as Dafny, P, and SAW into their development processes, raising the bar on the security, durability, availability, and quality of our products. AWS Automated Reasoning teams are changing how computer systems built on top of the cloud are built and operated.

04:00
60m
Amazon
Sponsors

10:00 - 11:00
KRAFTONSponsors at Sponsors

KRAFTON, creators of Player Unknown’s Battlegrounds(PUBG), provides a unique environment for researchers to collaborate with top tier engineers from AAA game makers to apply their academic findings to real-world products. We welcome you to join us and learn about ongoing deep learning research projects in KRAFTON to create virtual friend, and related opportunities (job, internship and academic collaboration).

10:00
60m
KRAFTON
Sponsors

15:00 - 16:00
MicrosoftSponsors at Sponsors

Microsoft Research (MSR) provides a dynamic environment for research careers with a network of world-class research labs led by globally recognized research scientists and engineers. You are welcome to join this session to learn about the opportunities (job, internship, and academic collaboration) in MSR.

15:00
60m
Microsoft
Sponsors

Wed 20 Jul

Displayed time zone: Seoul change

00:00 - 01:00
KeynoteKeynotes at Keynote
Chair(s): Yannis Smaragdakis University of Athens
00:00
60m
Talk
Neural Software Analysis: the Good, the Bad, and the Ugly
Keynotes
Michael Pradel University of Stuttgart
01:20 - 02:40
Session 1-1: Oracles, Models, and Measurement DTechnical Papers at ISSTA 1
01:20
20m
Talk
Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper
Technical Papers
Clay Stevens University of Nebraska-Lincoln, Hamid Bagheri University of Nebraska-Lincoln
DOI
01:40
20m
Talk
Evolution-Aware Detection of Order-Dependent Flaky Tests
Technical Papers
Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin
DOI
02:00
20m
Talk
jTrans: Jump-Aware Transformer for Binary Code Similarity Detection
Technical Papers
Hao Wang Tsinghua University, Wenjie Qu Huazhong University of Science and Technology, Gilad Katz Ben-Gurion University of the Negev, Wenyu Zhu Tsinghua University, Zeyu Gao University of Science and Technology of China, Han Qiu Tsinghua University, Jianwei Zhuge Tsinghua University, Chao Zhang Tsinghua University
DOI Pre-print
02:20
20m
Talk
On the Use of Evaluation Measures for Defect Prediction Studies
Technical Papers
Rebecca Moussa University College London, Federica Sarro University College London
DOI
01:20 - 02:20
Session 1-2: Test Generation and Mutation ATechnical Papers at ISSTA 2
Chair(s): Raghavan Komondoor IISc Bengaluru
01:20
20m
Talk
On the Use of Mutation Analysis For Evaluating Student Test Suite Quality
Technical Papers
James Perretta Northeastern University, Andrew DeOrio University of Michigan, Arjun Guha Northeastern University, Jonathan Bell Northeastern University
DOI
01:40
20m
Talk
Automated Test Generation for REST APIs: No Time to Rest Yet
Technical Papers
Myeongsoo Kim , Qi Xin Wuhan University, Saurabh Sinha IBM Research, Alessandro Orso Georgia Tech
DOI
02:00
20m
Talk
One Step Further: Evaluating Interpreters Using Metamorphic Testing
Technical Papers
Ming Fan Xi'an Jiaotong University, Jiali Wei Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhou Xu Wuhan University, Wenying Wei Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
DOI
03:00 - 04:00
Session 1-3: Oracles, Models, and Measurement ATechnical Papers at ISSTA 1
03:00
20m
Talk
Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper)
Technical Papers
Jialu Zhang Yale University, Todd Mytkowicz Microsoft Research, Mike Kaufman Microsoft Corporation, Ruzica Piskac Yale University, Shuvendu Lahiri Microsoft Research
DOI
03:20
20m
Talk
Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing
Technical Papers
Hasan Ferit Eniser MPI-SWS, Timo P. Gros Saarland University, Germany, Valentin Wüstholz ConsenSys, Jörg Hoffmann Saarland University and DFKI, Germany, Maria Christakis MPI-SWS
DOI Pre-print
03:40
20m
Talk
An Extensive Study on Pre-trained Models for Program Understanding and Generation
Technical Papers
Zhengran Zeng Southern University of Science and Technology, Hanzhuo Tan Southern University of Science and Technology, The Hong Kong Polytechnic University, Haotian Zhang , Jing Li The Hong Kong Polytech University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
03:00 - 04:00
Session 1-4: Smart Contracts ATechnical Papers at ISSTA 2
03:00
20m
Talk
eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts
Technical Papers
Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Karthik Pattabiraman University of British Columbia
DOI
03:20
20m
Talk
Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution
Technical Papers
Peilin Zheng Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University
DOI
03:40
20m
Talk
WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts
Technical Papers
Weimin Chen The Hong Kong Polytechnic University, Zihan Sun Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Haipeng Cai Washington State University, USA, Lei Wu Zhejiang University
DOI
04:00 - 05:00
VPlusLab Inc.Sponsors at Sponsors

VPlusLab Inc. was founded by the KAIST professors who have developed automated software testing/debugging techniques with industries for 20 years. To improve software quality and reliability cost-effectively, we provide automated software testing tools, training, and services.

We welcome you to join us and learn about VPlusLab Inc. (https://vpluslab.kr) and its automated unit testing tool CROWN 2.0 (https://vpluslab.kr/crown2).

See also this video about VPlusLab Inc.

04:00
60m
VPlusLab Inc.
Sponsors

07:00 - 08:20
Session 2-1: Oracles, Models, and Measurement ETechnical Papers at ISSTA 1
Chair(s): Christoph Csallner University of Texas at Arlington
07:00
20m
Talk
On the Use of Evaluation Measures for Defect Prediction Studies
Technical Papers
Rebecca Moussa University College London, Federica Sarro University College London
DOI
07:20
20m
Talk
Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper
Technical Papers
Clay Stevens University of Nebraska-Lincoln, Hamid Bagheri University of Nebraska-Lincoln
DOI
07:40
20m
Talk
Evolution-Aware Detection of Order-Dependent Flaky Tests
Technical Papers
Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin
DOI
08:00
20m
Talk
FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases
Technical Papers
Gabin An KAIST, Shin Yoo KAIST
DOI Pre-print
07:00 - 08:20
Session 2-2: Neural Networks, Learning, NLP ETechnical Papers at ISSTA 2
07:00
20m
Talk
Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper
Technical Papers
Zhiming Li Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Singapore, Haoliang Li City University of Hong Kong, Zhengzi Xu Nanyang Technological University, Yi Li Nanyang Technological University, Singapore, Yang Liu Nanyang Technological University
DOI
07:20
20m
Talk
DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions
Technical Papers
Danning Xie Purdue University, Yitong Li University of Waterloo, Mijung Kim UNIST, Hung Viet Pham University of Waterloo, Lin Tan Purdue University, Xiangyu Zhang Purdue University, Michael W. Godfrey University of Waterloo, Canada
DOI
07:40
20m
Talk
HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models
Technical Papers
Yu Li The Chinese University of Hong Kong, Muxi Chen The Chinese University of Hong Kong, Xu, Qiang
DOI
08:00
20m
Talk
Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs
Technical Papers
Charaka Geethal Monash University, Thuan Pham The University of Melbourne, Aldeida Aleti Monash University, Marcel Böhme MPI-SP, Germany and Monash University, Australia
DOI Pre-print
08:40 - 09:40
Session 2-3: Oracles, Models, and Measurement BTechnical Papers at ISSTA 1
08:40
20m
Talk
TELL: Log Level Suggestions via Modeling Multi-level Code Block Information
Technical Papers
Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore
DOI
09:00
20m
Talk
Hunting Bugs with Accelerated Optimal Graph Vertex Matching
Technical Papers
Xiaohui Zhang Renmin University of China, Yuanjun Gong Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wei You Renmin University of China, Wenchang Shi Renmin University of China, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI
09:20
20m
Talk
Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper)
Technical Papers
Jialu Zhang Yale University, Todd Mytkowicz Microsoft Research, Mike Kaufman Microsoft Corporation, Ruzica Piskac Yale University, Shuvendu Lahiri Microsoft Research
DOI
08:40 - 09:40
Session 2-4: Neural Networks, Learning, NLP BTechnical Papers at ISSTA 2
08:40
20m
Talk
ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems
Technical Papers
Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Zhenyu Chen Nanjing University
DOI
09:00
20m
Talk
BET: Black-box Efficient Testing for Convolutional Neural Networks
Technical Papers
Wang Jialai Tsinghua University, Han Qiu Tsinghua University, Yi Rong Tsinghua University, Hengkai Ye Purdue University, Qi Li Tsinghua University, Zongpeng Li Tsinghua University, Chao Zhang Tsinghua University
DOI
09:20
20m
Talk
Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment
Technical Papers
Geunwoo Kim University of California, Irvine, USA, Sanghyun Hong Oregon State University, Michael Franz University of California, Irvine, Dokyung Song Yonsei University, South Korea
DOI
10:00 - 11:00
Session 2-5: Android BTechnical Papers at ISSTA 1
Chair(s): Christoph Csallner University of Texas at Arlington
10:00
20m
Talk
Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study)
Technical Papers
Pei Liu Monash University, Yanjie Zhao Monash University, Haipeng Cai Washington State University, USA, Mattia Fazzini University of Minnesota, John Grundy Monash University, Li Li Monash University
DOI
10:20
20m
Talk
PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications
Technical Papers
Shuaihao Yang Nanjing University of Science and Technology, Zigang Zeng Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology
DOI
10:40
20m
Talk
Detecting and Fixing Data Loss Issues in Android Apps
Technical Papers
Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University
DOI
10:00 - 10:40
Session 2-6: Concurrency, IoT, Embedded ETechnical Papers at ISSTA 2
10:00
20m
Talk
Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems
Technical Papers
Ziyuan Zhong Columbia University, Zhisheng Hu Baidu Security, Shengjian Guo Baidu Security, Xinyang Zhang Baidu Security, Zhenyu Zhong Baidu USA, Baishakhi Ray Columbia University
DOI
10:20
20m
Talk
Deadlock Prediction via Generalized Dependency
Technical Papers
Jinpeng Zhou University of Pittsburgh, Hanmei Yang University of Massachusetts Amherst, John Lange Oak Ridge National Lab/University of Pittsburgh, Tongping Liu University of Massachusetts at Amherst
DOI
15:00 - 16:00
KeynoteKeynotes at Keynote
Chair(s): Sukyoung Ryu KAIST
15:00
60m
Talk
Neural Software Analysis: the Good, the Bad, and the Ugly
Keynotes
Michael Pradel University of Stuttgart
16:20 - 17:40
Session 3-1: Static Analysis and Specifications Testing CTechnical Papers at ISSTA 1
Chair(s): Ding Li Peking University
16:20
20m
Talk
A Large-scale Study of Usability Criteria addressed by Static Analysis Tools
Technical Papers
Marcus Nachtigall Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institute, Paderborn University, Eric Bodden University of Paderborn; Fraunhofer IEM
DOI
16:40
20m
Talk
An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection
Technical Papers
Stephan Lipp Technical University of Munich, Sebastian Banescu Technical University of Munich, Alexander Pretschner TU Munich
DOI Pre-print
17:00
20m
Talk
Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper)
Technical Papers
Frank Busse Imperial College London, Pritam Gharat Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London
DOI Pre-print
17:20
20m
Talk
Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
Technical Papers
Xiao Cheng University of Technology Sydney, Guanqin Zhang University of Technology Sydney, Haoyu Wang Huazhong University of Science and Technology, China, Yulei Sui University of New South Wales
DOI
16:20 - 17:20
Session 3-2: Fuzzing and Friends CTechnical Papers at ISSTA 2
Chair(s): Behnaz Hassanshahi Oracle Labs, Australia
16:20
20m
Talk
SnapFuzz: High-Throughput Fuzzing of Network Applications
Technical Papers
Anastasios Andronidis Imperial College London, UK, Cristian Cadar Imperial College London, UK
DOI
16:40
20m
Talk
SLIME: Program-sensitive Energy Allocation for Fuzzing
Technical Papers
Chenyang Lyu Zhejiang University, Hong Liang Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Binbin Zhao Georgia Institute of Technology, Meng Han Binjiang Institute of Zhejiang University & Zhejiang University, Yun Li Huawei Technologies Co., Ltd., Zhe Wang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology
DOI
17:00
20m
Talk
Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs
Technical Papers
Sumit Lahiri Indian Institute Of Technology Kanpur, Subhajit Roy IIT Kanpur, India
DOI
18:00 - 19:00
Session 3-3: Test Generation and Mutation CTechnical Papers at ISSTA 1
Chair(s): Stefan Winter LMU Munich
18:00
20m
Talk
One Step Further: Evaluating Interpreters Using Metamorphic Testing
Technical Papers
Ming Fan Xi'an Jiaotong University, Jiali Wei Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhou Xu Wuhan University, Wenying Wei Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
DOI
18:20
20m
Talk
Test Mimicry to Assess the Exploitability of Library Vulnerabilities
Technical Papers
Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Xuan Bach D. Le The University of Melbourne, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, David Lo Singapore Management University
DOI
18:40
20m
Talk
RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History
Technical Papers
Xuezhi Song Fudan University, Yun Lin National University of Singapore, Siang Hwee Ng National University of Singapore, Yijian Wu Fudan University, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University
DOI Pre-print
18:00 - 19:00
Session 3-4: Fuzzing and Friends ETechnical Papers at ISSTA 2
Chair(s): Ding Li Peking University
18:00
20m
Talk
Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation
Technical Papers
Yaowen Zheng Nanyang Technological University; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China;, Yuekang Li Nanyang Technological University, Cen Zhang Nanyang Technological University, Hongsong Zhu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University, Limin Sun Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China
DOI
18:20
20m
Talk
MDPFuzz: Testing Models Solving Markov Decision Processes
Technical Papers
Qi Pang HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
DOI
18:40
20m
Talk
PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation
Technical Papers
Zheyu Ma , Bodong Zhao Tsinghua University, Letu Ren Department of Computer Science and Technology, Tsinghua University, Zheming Li Tsinghua University, Siqi Ma the University of Queensland, Xiapu Luo Hong Kong Polytechnic University, Chao Zhang Tsinghua University
DOI

Thu 21 Jul

Displayed time zone: Seoul change

00:00 - 01:00
KeynoteKeynotes at Keynote
Chair(s): Yannis Smaragdakis University of Athens
00:00
60m
Talk
Software Developer Tools for Democratizing Heterogeneous Computing Applications
Keynotes
Miryung Kim University of California at Los Angeles, USA
01:20 - 02:00
Session 1-5: Static Analysis and Specifications Testing DTechnical Papers at ISSTA 1
01:20
20m
Talk
Testing Dafny (Experience Paper)
Technical Papers
Ahmed Irfan Amazon Web Services, Sorawee Porncharoenwase University of Washington, Zvonimir Rakamaric Amazon Web Services, Neha Rungta Amazon Web Services, Emina Torlak Amazon Web Services
DOI
01:40
20m
Talk
The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper
Technical Papers
Ingkarat Rak-amnouykit Rensselaer Polytechnic Institute, Ana Milanova Rensselaer Polytechnic Institute, Guillaume Baudart Inria; ENS; PSL University, Martin Hirzel IBM Research, Julian Dolby IBM Research, USA
DOI
01:20 - 02:20
Session 1-6: Concurrency, IoT, Embedded ATechnical Papers at ISSTA 2
01:20
20m
Talk
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware
Technical Papers
Binbin Zhao Georgia Institute of Technology, Shouling Ji Zhejiang University, Jiacheng Xu Zhejiang University, Yuan Tian University of Virginia, Qiuyang Wei Zhejiang University, Qinying Wang Zhejiang University, Chenyang Lyu Zhejiang University, Xuhong Zhang Zhejiang University, Changting Lin Binjiang Institute of Zhejiang University, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Raheem Beyah Georgia Institute of Technology
DOI
01:40
20m
Talk
Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems
Technical Papers
Ziyuan Zhong Columbia University, Zhisheng Hu Baidu Security, Shengjian Guo Baidu Security, Xinyang Zhang Baidu Security, Zhenyu Zhong Baidu USA, Baishakhi Ray Columbia University
DOI
02:00
20m
Talk
Understanding Device Integration Bugs in Smart Home System
Technical Papers
Tao Wang , Kangkang Zhang Institute of Software Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
DOI
03:00 - 04:00
Session 1-7: Static Analysis and Specifications Testing ATechnical Papers at ISSTA 1
Chair(s): Raghavan Komondoor IISc Bengaluru
03:00
20m
Talk
A Large-scale Study of Usability Criteria addressed by Static Analysis Tools
Technical Papers
Marcus Nachtigall Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institute, Paderborn University, Eric Bodden University of Paderborn; Fraunhofer IEM
DOI
03:20
20m
Talk
An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection
Technical Papers
Stephan Lipp Technical University of Munich, Sebastian Banescu Technical University of Munich, Alexander Pretschner TU Munich
DOI Pre-print
03:40
20m
Talk
Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper)
Technical Papers
Frank Busse Imperial College London, Pritam Gharat Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London
DOI Pre-print
03:00 - 03:40
Session 1-8: Concurrency, IoT, Embedded DTechnical Papers at ISSTA 2
03:00
20m
Talk
Deadlock Prediction via Generalized Dependency
Technical Papers
Jinpeng Zhou University of Pittsburgh, Hanmei Yang University of Massachusetts Amherst, John Lange Oak Ridge National Lab/University of Pittsburgh, Tongping Liu University of Massachusetts at Amherst
DOI
03:20
20m
Talk
Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning
Technical Papers
Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China
DOI
07:00 - 08:00
Session 2-7: Test Generation and Mutation BTechnical Papers at ISSTA 1
Chair(s): Christoph Csallner University of Texas at Arlington
07:00
20m
Talk
Automated Test Generation for REST APIs: No Time to Rest Yet
Technical Papers
Myeongsoo Kim , Qi Xin Wuhan University, Saurabh Sinha IBM Research, Alessandro Orso Georgia Tech
DOI
07:20
20m
Talk
On the Use of Mutation Analysis For Evaluating Student Test Suite Quality
Technical Papers
James Perretta Northeastern University, Andrew DeOrio University of Michigan, Arjun Guha Northeastern University, Jonathan Bell Northeastern University
DOI
07:40
20m
Talk
Test Mimicry to Assess the Exploitability of Library Vulnerabilities
Technical Papers
Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Xuan Bach D. Le The University of Melbourne, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, David Lo Singapore Management University
DOI
07:00 - 08:00
Session 2-8: Concurrency, IoT, Embedded BTechnical Papers at ISSTA 2
07:00
20m
Talk
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware
Technical Papers
Binbin Zhao Georgia Institute of Technology, Shouling Ji Zhejiang University, Jiacheng Xu Zhejiang University, Yuan Tian University of Virginia, Qiuyang Wei Zhejiang University, Qinying Wang Zhejiang University, Chenyang Lyu Zhejiang University, Xuhong Zhang Zhejiang University, Changting Lin Binjiang Institute of Zhejiang University, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Raheem Beyah Georgia Institute of Technology
DOI
07:20
20m
Talk
Automated Testing of Image Captioning Systems
Technical Papers
BoXi Yu The Chinese University of Hong Kong, Shenzhen, Zhiqing Zhong South China University of Technology, Xinran Qin South China University of Technology, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuancheng Wang The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen
DOI
07:40
20m
Talk
LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems
Technical Papers
Guo An Nanjing University, Yang Feng Nanjing University, Zhenyu Chen Nanjing University
DOI
08:40 - 09:40
Session 2-9: Test Generation and Mutation DTechnical Papers at ISSTA 1
08:40
20m
Talk
Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing
Technical Papers
Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yicheng Wang Institute of Software Chinese Academy of Sciences, Zheng Qin Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
09:00
20m
Talk
RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History
Technical Papers
Xuezhi Song Fudan University, Yun Lin National University of Singapore, Siang Hwee Ng National University of Singapore, Yijian Wu Fudan University, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University
DOI Pre-print
09:20
20m
Talk
Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis
Technical Papers
Zhiyong Wu Tsinghua University, China, Jie Liang School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University
DOI
08:40 - 09:40
Session 2-10: Static Analysis and Specifications Testing BTechnical Papers at ISSTA 2
Chair(s): Behnaz Hassanshahi Oracle Labs, Australia
08:40
20m
Talk
Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
Technical Papers
Xiao Cheng University of Technology Sydney, Guanqin Zhang University of Technology Sydney, Haoyu Wang Huazhong University of Science and Technology, China, Yulei Sui University of New South Wales
DOI
09:00
20m
Talk
Testing Dafny (Experience Paper)
Technical Papers
Ahmed Irfan Amazon Web Services, Sorawee Porncharoenwase University of Washington, Zvonimir Rakamaric Amazon Web Services, Neha Rungta Amazon Web Services, Emina Torlak Amazon Web Services
DOI
09:20
20m
Talk
The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper
Technical Papers
Ingkarat Rak-amnouykit Rensselaer Polytechnic Institute, Ana Milanova Rensselaer Polytechnic Institute, Guillaume Baudart Inria; ENS; PSL University, Martin Hirzel IBM Research, Julian Dolby IBM Research, USA
DOI
10:00 - 11:00
Tool DemonstrationsTool Demonstrations at Tool demo
10:00
5m
Talk
ATUA: an Update-driven App Testing Tool
Tool Demonstrations
Chanh-Duc Ngo University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
DOI
10:05
5m
Talk
Automatic Generation of Smoke Test Suites for Kubernetes
Tool Demonstrations
Cecilio Cannavacciuolo , Leonardo Mariani University of Milano-Bicocca
DOI
10:10
5m
Talk
ESBMC-CHERI: Towards Verification of C Programs for CHERI Platforms with ESBMC
Tool Demonstrations
Franz Brausse The University of Manchester, Fedor Shmarov The University of Manchester, Rafael Menezes University of Manchester, Mikhail R. Gadelha Igalia, Konstantin Korovin University of Manchester, Giles Reger University of Manchester, Lucas C. Cordeiro University of Manchester
DOI
10:16
5m
Talk
ESBMC-Jimple: Verifying Kotlin Programs via Jimple Intermediate Representation
Tool Demonstrations
Rafael Menezes University of Manchester, Rosiane de Freitas Federal University of Amazonas, Daniel Moura Federal University of Amazonas, Helena Cavalcante Federal University of Amazonas, Lucas C. Cordeiro University of Manchester
DOI
10:21
5m
Talk
Faster Mutation Analysis with MeMu
Tool Demonstrations
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
DOI
10:27
5m
Talk
iFixDataloss: A Tool for Detecting and Fixing Data Loss Issues in Android Apps
Tool Demonstrations
Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University
DOI
10:32
5m
Talk
Maestro: A Platform for Benchmarking Automatic Program Repair Tools on Software Vulnerabilities
Tool Demonstrations
Eduard Costel Pinconschi Instituto Superior Técnico, University of Lisboa & INESC-ID, Quang-Cuong Bui Hamburg University of Technology, Rui Abreu Faculty of Engineering, University of Porto, Portugal, Pedro Adão IST-ULisboa and Instituto de Telecomunicações, Riccardo Scandariato Hamburg University of Technology
DOI
10:38
5m
Talk
Pytest-Smell: A smell detection tool for Python unit tests
Tool Demonstrations
Alexandru Bodea Student at Babes Bolay University - Faculty of Mathematics and Computer Science
DOI
10:43
5m
Talk
QMutPy: A Mutation Testing Tool for Quantum Algorithms & Applications in Qiskit
Tool Demonstrations
Daniel Fortunato INESC-ID, University of Porto, José Campos Faculty of Engineering of University of Porto & LASIGE, Portugal, Rui Abreu Faculty of Engineering, University of Porto, Portugal
DOI
10:49
5m
Talk
SpecChecker-ISA: A Data Sharing Analyzer for Interrupt-driven Embedded Software
Tool Demonstrations
Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China
DOI
10:54
5m
Talk
UniRLTest: Universal Platform-Independent Testing with Reinforcement Learning via Image Understanding
Tool Demonstrations
Ziqian Zhang Nanjing University, Yulei Liu Nanjing University, Shengcheng Yu Nanjing University, Xin Li Nanjing University, Yexiao Yun Nanjing University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University
DOI
15:00 - 16:00
KeynoteKeynotes at Keynote
Chair(s): Sukyoung Ryu KAIST
15:00
60m
Talk
Software Developer Tools for Democratizing Heterogeneous Computing Applications
Keynotes
Miryung Kim University of California at Los Angeles, USA
16:20 - 17:40
Session 3-5: Concurrency, IoT, Embedded CTechnical Papers at ISSTA 1
Chair(s): Stefan Winter LMU Munich
16:20
20m
Talk
Understanding Device Integration Bugs in Smart Home System
Technical Papers
Tao Wang , Kangkang Zhang Institute of Software Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
DOI
16:40
20m
Talk
Automated Testing of Image Captioning Systems
Technical Papers
BoXi Yu The Chinese University of Hong Kong, Shenzhen, Zhiqing Zhong South China University of Technology, Xinran Qin South China University of Technology, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuancheng Wang The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen
DOI
17:00
20m
Talk
LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems
Technical Papers
Guo An Nanjing University, Yang Feng Nanjing University, Zhenyu Chen Nanjing University
DOI
17:20
20m
Talk
Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning
Technical Papers
Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China
DOI
16:20 - 17:40
Session 3-6: Neural Networks, Learning, NLP FTechnical Papers at ISSTA 2
16:20
20m
Talk
AEON: A Method for Automatic Evaluation of NLP Test Cases
Technical Papers
Jen-tse Huang The Chinese University of Hong Kong, Jianping Zhang The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong
DOI
16:40
20m
Talk
HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models
Technical Papers
Yu Li The Chinese University of Hong Kong, Muxi Chen The Chinese University of Hong Kong, Xu, Qiang
DOI
17:00
20m
Talk
Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment
Technical Papers
Geunwoo Kim University of California, Irvine, USA, Sanghyun Hong Oregon State University, Michael Franz University of California, Irvine, Dokyung Song Yonsei University, South Korea
DOI
17:20
20m
Talk
Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs
Technical Papers
Charaka Geethal Monash University, Thuan Pham The University of Melbourne, Aldeida Aleti Monash University, Marcel Böhme MPI-SP, Germany and Monash University, Australia
DOI Pre-print
18:00 - 18:40
Session 3-7: Test Generation and Mutation ETechnical Papers at ISSTA 1
18:00
20m
Talk
Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing
Technical Papers
Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yicheng Wang Institute of Software Chinese Academy of Sciences, Zheng Qin Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
18:20
20m
Talk
Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis
Technical Papers
Zhiyong Wu Tsinghua University, China, Jie Liang School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University
DOI
18:00 - 18:40
Session 3-8: Program Repair CTechnical Papers at ISSTA 2
18:00
20m
Talk
CIRCLE: Continual Repair across Programming Languages
Technical Papers
Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland
DOI
18:20
20m
Talk
Program Vulnerability Repair via Inductive Inference
Technical Papers
Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore
DOI
23:00 - 23:15
Awards & ReportsKeynotes at Keynote
23:00
15m
Talk
Award Presentations & Chair Report
Keynotes
Sukyoung Ryu KAIST, Yannis Smaragdakis University of Athens
23:15 - 00:00
Impact Paper PresentationKeynotes at Keynote
Chair(s): Sukyoung Ryu KAIST
23:15
45m
Talk
Probabilistic Symbolic Execution: Quantitative Program Analysis through Model Counting
Keynotes
Jaco Geldenhuys University of Stellenbosch, South Africa, Matthew B Dwyer University of Virginia, Willem Visser Stellenbosch University
DOI

Fri 22 Jul

Displayed time zone: Seoul change

00:00 - 01:00
Session 1-9: Fuzzing and Friends ATechnical Papers at ISSTA 1
00:00
20m
Talk
Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs
Technical Papers
Sumit Lahiri Indian Institute Of Technology Kanpur, Subhajit Roy IIT Kanpur, India
DOI
00:20
20m
Talk
MDPFuzz: Testing Models Solving Markov Decision Processes
Technical Papers
Qi Pang HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
DOI
00:40
20m
Talk
SnapFuzz: High-Throughput Fuzzing of Network Applications
Technical Papers
Anastasios Andronidis Imperial College London, UK, Cristian Cadar Imperial College London, UK
DOI
00:00 - 01:00
Session 1-10: Neural Networks, Learning, NLP ATechnical Papers at ISSTA 2
00:00
20m
Talk
AEON: A Method for Automatic Evaluation of NLP Test Cases
Technical Papers
Jen-tse Huang The Chinese University of Hong Kong, Jianping Zhang The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong
DOI
00:20
20m
Talk
Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study)
Technical Papers
Michael Weiss Università della Svizzera italiana (USI), Paolo Tonella USI Lugano
DOI Pre-print
00:40
20m
Talk
ε-weakened Robustness of Deep Neural Networks
Technical Papers
Pei Huang State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Yuting Yang Institute of Computing Technology,Chinese Academy of Sciences; University of Chinese Academy of Sciences, Minghao Liu Institute of Software, Chinese Academy of Sciences, Fuqi Jia State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI
01:40 - 02:20
Session 1-11: Fuzzing and Friends DTechnical Papers at ISSTA 1
01:40
20m
Talk
Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation
Technical Papers
Yaowen Zheng Nanyang Technological University; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China;, Yuekang Li Nanyang Technological University, Cen Zhang Nanyang Technological University, Hongsong Zhu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University, Limin Sun Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China
DOI
02:00
20m
Talk
TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving
Technical Papers
Xuwei Liu Purdue University, USA, Wei You Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University
DOI
01:40 - 02:20
Session 1-12: Neural Networks, Learning, NLP DTechnical Papers at ISSTA 2
01:40
20m
Talk
Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper
Technical Papers
Zhiming Li Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Singapore, Haoliang Li City University of Hong Kong, Zhengzi Xu Nanyang Technological University, Yi Li Nanyang Technological University, Singapore, Yang Liu Nanyang Technological University
DOI
02:00
20m
Talk
DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions
Technical Papers
Danning Xie Purdue University, Yitong Li University of Waterloo, Mijung Kim UNIST, Hung Viet Pham University of Waterloo, Lin Tan Purdue University, Xiangyu Zhang Purdue University, Michael W. Godfrey University of Waterloo, Canada
DOI
03:00 - 03:40
Session 1-13: Program Repair ATechnical Papers at ISSTA 1
03:00
20m
Talk
ATR: Template-based Repair for Alloy Specifications
Technical Papers
Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln
DOI
03:20
20m
Talk
Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code
Technical Papers
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
DOI Pre-print
03:00 - 03:40
Session 1-14: Android ATechnical Papers at ISSTA 2
Chair(s): Christoph Csallner University of Texas at Arlington
03:00
20m
Talk
Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android
Technical Papers
Yifei Lu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Xuandong Li Nanjing University
DOI
03:20
20m
Talk
NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper
Technical Papers
Hao Zhou The Hong Kong Polytechnic University, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Ting Wang Pennsylvania State University, Yajin Zhou Zhejiang University, Chao Zhang Tsinghua University, Haipeng Cai Washington State University, USA
DOI
07:00 - 08:00
Session 2-13: Fuzzing and Friends BTechnical Papers at ISSTA 1
07:00
20m
Talk
PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation
Technical Papers
Zheyu Ma , Bodong Zhao Tsinghua University, Letu Ren Department of Computer Science and Technology, Tsinghua University, Zheming Li Tsinghua University, Siqi Ma the University of Queensland, Xiapu Luo Hong Kong Polytechnic University, Chao Zhang Tsinghua University
DOI
07:20
20m
Talk
SLIME: Program-sensitive Energy Allocation for Fuzzing
Technical Papers
Chenyang Lyu Zhejiang University, Hong Liang Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Binbin Zhao Georgia Institute of Technology, Meng Han Binjiang Institute of Zhejiang University & Zhejiang University, Yun Li Huawei Technologies Co., Ltd., Zhe Wang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology
DOI
07:40
20m
Talk
TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving
Technical Papers
Xuwei Liu Purdue University, USA, Wei You Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University
DOI
07:00 - 08:20
Session 2-14: Program Repair BTechnical Papers at ISSTA 2
Chair(s): Christoph Csallner University of Texas at Arlington
07:00
20m
Talk
ATR: Template-based Repair for Alloy Specifications
Technical Papers
Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln
DOI
07:20
20m
Talk
CIRCLE: Continual Repair across Programming Languages
Technical Papers
Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland
DOI
07:40
20m
Talk
Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code
Technical Papers
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
DOI Pre-print
08:00
20m
Talk
Program Vulnerability Repair via Inductive Inference
Technical Papers
Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore
DOI
08:40 - 09:40
Session 2-15: Smart Contracts BTechnical Papers at ISSTA 1
08:40
20m
Talk
eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts
Technical Papers
Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Karthik Pattabiraman University of British Columbia
DOI
09:00
20m
Talk
Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper
Technical Papers
Ye Liu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Singapore, Shang-Wei Lin Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden
DOI Pre-print
09:20
20m
Talk
SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability
Technical Papers
Zeqin Liao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiao Chen Sun Yat-sen University, Yuhong Nan Sun Yat-sen University
DOI
15:00 - 16:20
Session 3-9: Smart Contracts CTechnical Papers at ISSTA 1
15:00
20m
Talk
Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper
Technical Papers
Ye Liu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Singapore, Shang-Wei Lin Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden
DOI Pre-print
15:20
20m
Talk
Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution
Technical Papers
Peilin Zheng Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University
DOI
15:40
20m
Talk
SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability
Technical Papers
Zeqin Liao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiao Chen Sun Yat-sen University, Yuhong Nan Sun Yat-sen University
DOI
16:00
20m
Talk
WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts
Technical Papers
Weimin Chen The Hong Kong Polytechnic University, Zihan Sun Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Haipeng Cai Washington State University, USA, Lei Wu Zhejiang University
DOI
15:00 - 16:20
Session 3-10: Neural Networks, Learning, NLP CTechnical Papers at ISSTA 2
15:00
20m
Talk
ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems
Technical Papers
Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Zhenyu Chen Nanjing University
DOI
15:20
20m
Talk
BET: Black-box Efficient Testing for Convolutional Neural Networks
Technical Papers
Wang Jialai Tsinghua University, Han Qiu Tsinghua University, Yi Rong Tsinghua University, Hengkai Ye Purdue University, Qi Li Tsinghua University, Zongpeng Li Tsinghua University, Chao Zhang Tsinghua University
DOI
15:40
20m
Talk
Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study)
Technical Papers
Michael Weiss Università della Svizzera italiana (USI), Paolo Tonella USI Lugano
DOI Pre-print
16:00
20m
Talk
ε-weakened Robustness of Deep Neural Networks
Technical Papers
Pei Huang State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Yuting Yang Institute of Computing Technology,Chinese Academy of Sciences; University of Chinese Academy of Sciences, Minghao Liu Institute of Software, Chinese Academy of Sciences, Fuqi Jia State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI
16:40 - 17:40
Session 3-11: Oracles, Models, and Measurement CTechnical Papers at ISSTA 1
16:40
20m
Talk
An Extensive Study on Pre-trained Models for Program Understanding and Generation
Technical Papers
Zhengran Zeng Southern University of Science and Technology, Hanzhuo Tan Southern University of Science and Technology, The Hong Kong Polytechnic University, Haotian Zhang , Jing Li The Hong Kong Polytech University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
17:00
20m
Talk
Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing
Technical Papers
Hasan Ferit Eniser MPI-SWS, Timo P. Gros Saarland University, Germany, Valentin Wüstholz ConsenSys, Jörg Hoffmann Saarland University and DFKI, Germany, Maria Christakis MPI-SWS
DOI Pre-print
17:20
20m
Talk
TELL: Log Level Suggestions via Modeling Multi-level Code Block Information
Technical Papers
Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore
DOI
16:40 - 17:40
Session 3-12: Android CTechnical Papers at ISSTA 2
16:40
20m
Talk
Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study)
Technical Papers
Pei Liu Monash University, Yanjie Zhao Monash University, Haipeng Cai Washington State University, USA, Mattia Fazzini University of Minnesota, John Grundy Monash University, Li Li Monash University
DOI
17:00
20m
Talk
Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android
Technical Papers
Yifei Lu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Xuandong Li Nanjing University
DOI
17:20
20m
Talk
NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper
Technical Papers
Hao Zhou The Hong Kong Polytechnic University, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Ting Wang Pennsylvania State University, Yajin Zhou Zhejiang University, Chao Zhang Tsinghua University, Haipeng Cai Washington State University, USA
DOI
18:00 - 19:00
Session 3-13: Oracles, Models, and Measurement FTechnical Papers at ISSTA 1
Chair(s): Stefan Winter LMU Munich
18:00
20m
Talk
jTrans: Jump-Aware Transformer for Binary Code Similarity Detection
Technical Papers
Hao Wang Tsinghua University, Wenjie Qu Huazhong University of Science and Technology, Gilad Katz Ben-Gurion University of the Negev, Wenyu Zhu Tsinghua University, Zeyu Gao University of Science and Technology of China, Han Qiu Tsinghua University, Jianwei Zhuge Tsinghua University, Chao Zhang Tsinghua University
DOI Pre-print
18:20
20m
Talk
FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases
Technical Papers
Gabin An KAIST, Shin Yoo KAIST
DOI Pre-print
18:40
20m
Talk
Hunting Bugs with Accelerated Optimal Graph Vertex Matching
Technical Papers
Xiaohui Zhang Renmin University of China, Yuanjun Gong Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wei You Renmin University of China, Wenchang Shi Renmin University of China, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI
18:00 - 18:40
Session 3-14: Android DTechnical Papers at ISSTA 2
18:00
20m
Talk
Detecting and Fixing Data Loss Issues in Android Apps
Technical Papers
Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University
DOI
18:20
20m
Talk
PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications
Technical Papers
Shuaihao Yang Nanjing University of Science and Technology, Zigang Zeng Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology
DOI