ISSTA 2025 Program
Wed 25 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:45 - 09:00 | |||
08:45 15mDay opening | Welcome to ISSTA 2025 Plenary Events Mike Papadakis University of Luxembourg |
09:00 - 09:30 | |||
09:00 30mAwards | SIGSOFT Impact Award Plenary Events |
09:30 - 10:30 | |||
09:30 60mKeynote | Leveraging Latent-space Generative Models for Testing Plenary Events Matthew B Dwyer University of Virginia |
11:00 - 12:30 | |||
11:00 15mDay opening | Opening Remarks Doctoral Symposium C: Andreas Zeller CISPA Helmholtz Center for Information Security, C: Darko Marinov University of Illinois at Urbana-Champaign, C: Jie M. Zhang King's College London, C: Federica Sarro University College London | ||
11:15 45mKeynote | Research and Impact in Academia and Industry Doctoral Symposium Mark Harman Meta Platforms, Inc. and UCL | ||
12:00 15mTalk | Job Talk #1: Search-based Software Testing Driven by Domain Knowledge Doctoral Symposium | ||
12:15 15mTalk | Job Talk #2: Regression Fault Detection and Mitigation in the Evolution of Deep Learning Systems Doctoral Symposium |
11:00 - 12:30 | Program RepairTool Demonstrations / Research Papers at Aurora A Chair(s): Yannic Noller Ruhr University Bochum | ||
11:00 25mTalk | LLM Hallucinations in Practical Code Generation: Phenomena, Mechanism, and Mitigation Research Papers Ziyao Zhang Sun Yat-sen University, Chong Wang Nanyang Technological University, Yanlin Wang Sun Yat-sen University, Ensheng Shi Xi’an Jiaotong University, Yuchi Ma Huawei Cloud Computing Technologies, Wanjun Zhong Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Mingzhi Mao Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
11:25 25mTalk | AdverIntent-Agent: Adversarial Reasoning for Repair Based on Inferred Program Intent Research Papers He Ye University College London (UCL), Aidan Z.H. Yang Carnegie Mellon University, Chang Hu Macau University of Science and Technology, Yanlin Wang Sun Yat-sen University, Tao Zhang Macau University of Science and Technology, Claire Le Goues Carnegie Mellon University DOI | ||
11:50 25mTalk | PatchScope: LLM-Enhanced Fine-Grained Stable Patch Classification for Linux Kernel Research Papers Rongkai Liu Central South University, Heyuan Shi Central South University, Shuning Liu Central South University, China, Chao Hu Central South University, Sisheng Li Central South University, China, Yuheng Shen Tsinghua University, Runzhe Wang Alibaba Group, Xiaohai Shi Alibaba Group, Yu Jiang Tsinghua University DOI | ||
12:15 15mDemonstration | InfraFix: Technology-Agnostic Repair of Infrastructure as Code Tool Demonstrations Nuno Saavedra INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC |
11:00 - 12:15 | |||
11:00 25mTalk | Beyond Static Pattern Matching? Rethinking Automatic Cryptographic API Misuse Detection in the Era of LLMs Research Papers Yifan Xia , Zichen Xie Zhejiang University, China, Peiyu Liu Zhejiang University, Kangjie Lu University of Minnesota, Yan Liu Ant Group, Wenhai Wang Zhejiang University, Shouling Ji Zhejiang University DOI | ||
11:25 25mTalk | Pepper: Preference-Aware Active Trapping for Ransomware Research Papers Huan Zhang Institute of Information Engineering, Chinese Academy of Sciences, Zhengkai Qin Institute of Information Engineering,Chinese Academy of Sciences, Lixin Zhao Institute of Information Engineering,Chinese Academy of Sciences, Aimin Yu Institute of Information Engineering, Chinese Academy of Sciences, Lijun Cai Institute of Information Engineering,Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
11:50 25mTalk | ICEPRE: ICS protocol reverse engineering via data-driven concolic execution Research Papers Yibo Qu Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Zhen Wang Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Jiaxing Cheng Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Shuaizong Si Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Yongle Chen Taiyuan University of Technology, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI |
11:00 - 12:15 | Systems and PerformanceResearch Papers at Aurora C Chair(s): Lars Grunske Humboldt-Universität zu Berlin | ||
11:00 25mTalk | Preventing Disruption of System Backup Against Ransomware Attacks Research Papers Yiwei Hou Tsinghua University, Lihua Guo Tsinghua University, Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Wenhuan Liu Tsinghua University/Union Tech, Chengnian Sun University of Waterloo, Yu Jiang Tsinghua University DOI | ||
11:25 25mTalk | Rethinking Performance Analysis for Configurable Software Systems: A Case Study from a Fitness Landscape Perspective Research Papers Mingyu Huang University of Electronic Science and Technology of China, Peili Mao University of Electronic Science and Technology of China, Ke Li University of Exeter DOI | ||
11:50 25mTalk | Hulk: Exploring Data-Sensitive Performance Anomalies in DBMSs via Data-Driven Analysis Research Papers Zhiyong Wu Tsinghua University, China, Jie Liang , Jingzhou Fu School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Yu Jiang Tsinghua University DOI |
11:00 - 12:15 | Fairness and LLM TestingResearch Papers at Cosmos 3A Chair(s): Andreas Metzger University of Duisburg-Essen | ||
11:00 25mTalk | Fairness Mediator: Neutralize Stereotype Associations to Mitigate Bias in Large Language Models Research Papers Yisong Xiao Beihang University, Aishan Liu Beihang University; Institute of Dataspace, Siyuan Liang National University of Singapore, Xianglong Liu Beihang University; Institute of Dataspace; Zhongguancun Laboratory, Dacheng Tao Nanyang Technological University DOI | ||
11:25 25mTalk | ClassEval-T: Evaluating Large Language Models in Class-Level Code Translation Research Papers Pengyu Xue Shandong University, Linhao Wu Shandong University, Zhen Yang Shandong University, Chengyi Wang Shandong University, Xiang Li Shandong University, Yuxiang Zhang Shandong University, Jia Li Tsinghua University, Ruikai Jin Shandong University, Yifei Pei Shandong University, Zhaoyan Shen Shandong University, Xiran Lyu Shandong University, Jacky Keung City University of Hong Kong DOI | ||
11:50 25mTalk | No Bias Left Behind: Fairness Testing for Deep Recommender Systems Targeting General Disadvantaged Groups Research Papers Zhuo Wu Tianjin International Engineering Institute, Tianjin University, Zan Wang Tianjin University, Chuan Luo Beihang University, Xiaoning Du Monash University, Junjie Chen Tianjin University DOI |
14:00 - 15:15 | Evolution, Continuous Integration, and DeploymentResearch Papers at Aurora A Chair(s): Laura Plein CISPA Helmholtz Center for Information Security | ||
14:00 25mTalk | Productively Deploying Emerging Models on Emerging Platforms: A Top-Down Approach for Testing and Debugging Research Papers Siyuan Feng Shanghai Jiao Tong University, Jiawei Liu University of Illinois at Urbana-Champaign, Ruihang Lai Carnegie Mellon University, Charlie F. Ruan Carnegie Mellon University, Yong Yu Shanghai Jiao Tong University, Lingming Zhang University of Illinois at Urbana-Champaign, Tianqi Chen DOI | ||
14:25 25mTalk | SWE-GPT: A Process-Centric Language Model for Automated Software Improvement Research Papers Yingwei Ma Alibaba Group, Rongyu Cao Tongyi Lab, Alibaba, China, Yongchang Cao Tongyi Lab, Alibaba, China, Yue Zhang Tongyi Lab, Alibaba, China, Jue Chen Tongyi Lab, Alibaba, China, Yibo Liu Tongyi Lab, Alibaba, China, Yuchen Liu Tongyi Lab, Alibaba, China, Binhua Li Tongyi Lab, Alibaba, China, Fei Huang Tongyi Lab, Alibaba, China, Yongbin Li Tongyi Lab, Alibaba, China DOI | ||
14:50 25mTalk | What Happened in This Pipeline? Diffing Build Logs With CiDiff Research Papers Nicolas Hubner University of Bordeaux, LaBRI, UMR 5800, F-33400, Talence, France, Jean-Rémy Falleri Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, Institut Universitaire de France, Raluca Uricaru Univ. Bordeaux, Bordeaux INP, CNRS, LaBRI, UMR5800, F-33400 Talence, France, Thomas Degueule CNRS, Thomas Durieux TU Delft DOI |
14:00 - 15:15 | |||
14:00 25mTalk | MoDitector: Module-Directed Testing for Autonomous Driving Systems Research Papers Renzhi Wang University of Alberta, Mingfei Cheng Singapore Management University, Xiaofei Xie Singapore Management University, Yuan Zhou Zhejiang Sci-Tech University, Lei Ma The University of Tokyo & University of Alberta DOI | ||
14:25 25mTalk | RouthSearch: Inferring PID Parameter Specification for Flight Control Program by Coordinate Search Research Papers Siao Wang Fudan University, Zhen Dong Fudan University, Hui Li Fudan University, China, Liwei Shen Fudan University, China, Xin Peng Fudan University, Dongdong She HKUST (The Hong Kong University of Science and Technology) DOI | ||
14:50 25mTalk | Testing the Fault-Tolerance of Multi-Sensor Fusion Perception in Autonomous Driving Systems Research Papers Haoxiang Tian Institute of Software, Chinese Academy of Sciences, wenqiang ding Nanjing Institute of Software, Nanjing, China, Xingshuo Han Nanyang Technological University, Singapore, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, An Guo Nanjing University, Junqi Zhang University of Science and Technology of China, China, Wei Chen Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tianwei Zhang Nanyang Technological University DOI |
14:00 - 15:15 | Runtime Analysis, Verification, and SlicingResearch Papers at Aurora C Chair(s): Heqing Huang City University of Hong Kong | ||
14:00 25mTalk | Adding Spatial Memory Safety to EDK II through Checked C (Experience Paper) Research Papers Sourag Cherupattamoolayil Purdue University, Arunkumar Bhattar Purdue University, Connor Everett Glosner Purdue University, Aravind Machiry Purdue University DOI | ||
14:25 25mTalk | LogBase: A Large-Scale Benchmark for Semantic Log Parsing Research Papers Chenbo Zhang Fudan University, Wenying Xu Fudan University, Jinbu Liu Alibaba, Lu Zhang Fudan University, Guiyang Liu Alibaba, Jihong Guan Tongji University, Qi Zhou Alibaba, Shuigeng Zhou Fudan University DOI | ||
14:50 25mTalk | Static Program Reduction via Type-Directed Slicing Research Papers Loi Ngo Duc Nguyen University of California, Riverside, Tahiatul Islam New Jersey Institute of Technology, Theron Wang The Academy for Mathematics, Science & Engineering, USA, Sam Lenz New Jersey Institute of Technology, Martin Kellogg New Jersey Institute of Technology DOI Pre-print |
14:00 - 15:30 | LLM-based Testing 1Research Papers / Tool Demonstrations at Cosmos 3A Chair(s): Qingkai Shi Nanjing University | ||
14:00 25mTalk | A Large-scale Empirical Study on Fine-tuning Large Language Models for Unit Testing Research Papers ye shang Nanjing University, Quanjun Zhang School of Computer Science and Engineering, Nanjing University of Science and Technology, Chunrong Fang Nanjing University, Siqi Gu Nanjing University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Zhenyu Chen Nanjing University DOI | ||
14:25 25mTalk | Validating Network Protocol Parsers with Traceable RFC Document Interpretation Research Papers Mingwei Zheng Purdue University, Danning Xie Purdue University, Qingkai Shi Nanjing University, Chengpeng Wang Purdue University, Xiangyu Zhang Purdue University DOI | ||
14:50 25mTalk | Tratto: A Neuro-Symbolic Approach to Deriving Axiomatic Test Oracles Research Papers Davide Molinelli USI Lugano; Schaffhausen Institute of Technology, Alberto Martin-Lopez Software Institute - USI, Lugano, Elliott Zackrone University of Washington, Beyza Eken Sakarya University, Michael D. Ernst University of Washington, Mauro Pezze Università della Svizzera italiana (USI) and Università degli Studi di Milano Bicocca and CIT Constructor Institute of Technology DOI Pre-print | ||
15:15 15mDemonstration | Kitten: A Simple Yet Effective Baseline for Evaluating LLM-Based Compiler Testing Techniques Tool Demonstrations Yuanmin Xie Tsinghua University, Zhenyang Xu University of Waterloo, Yongqiang Tian , Min Zhou , Xintong Zhou University of Waterloo, Chengnian Sun University of Waterloo |
16:00 - 18:00 | |||
16:00 60mLive Q&A | Ask Me Anything Doctoral Symposium | ||
17:00 60mMeeting | Break Out Sessions Doctoral Symposium |
16:00 - 17:30 | Mobile and Concurrency TestingResearch Papers / Tool Demonstrations at Aurora A Chair(s): Li Li Beihang University | ||
16:00 25mTalk | Intention-based GUI Test Migration for Mobile Apps using Large Language Models Research Papers Shaoheng Cao Nanjing University, Minxue Pan Nanjing University, Yuanhong Lan Nanjing University, Xuandong Li Nanjing University DOI | ||
16:25 25mTalk | GoPV: Detecting Blocking Concurrency Bugs Related to Shared-Memory Synchronization in Go Research Papers Wei Song Nanjing University of Science and Technology, Xiaofan Xu Nanjing University of Science and Technology, Jeff Huang Texas A&M University DOI | ||
16:50 25mTalk | Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection Research Papers haodong li Beijing University of Posts and Telecommunications, Xiao Cheng Macquarie University, Yanjie Zhao Huazhong University of Science and Technology, Guosheng Xu Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology, Shenzhen, Haoyu Wang Huazhong University of Science and Technology DOI | ||
17:15 15mDemonstration | GoPV: A Static Analyzer for Finding Blocking Concurrency Bugs Due to Misuse of Shared-Memory Synchronization in Go Tool Demonstrations Xiaofan Xu Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University |
16:00 - 17:15 | Database TestingResearch Papers at Aurora B Chair(s): Alberto Martin-Lopez Software Institute - USI, Lugano | ||
16:00 25mTalk | QTRAN: Extending Metamorphic-Oracle based Logical Bug Detection Techniques for Multiple-DBMS Dialect Support Research Papers Li Lin Xiamen University, Qinglin Zhu School of Informatics, Xiamen University, Hongqiao Chen School of Informatics, Xiamen University, Zhuangda Wang Xiamen University, Rongxin Wu Xiamen University, Xiaoheng Xie Ant Group DOI | ||
16:25 25mTalk | Detecting Isolation Anomalies in Relational DBMSs Research Papers Rui Yang Institute of Software, Chinese Academy of Sciences, Ziyu Cui Institute of Software at Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiansen Song Institute of Software at Chinese Academy of Sciences, Xudong Xie Institute of Software Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:50 25mTalk | Understanding Practitioners’ Expectations on Clear Code Review Comments Research Papers Junkai Chen Singapore Management University, Singapore, Zhenhao Li York University, Qiheng Mao Zhejiang University, Xing Hu Zhejiang University, Kui Liu Huawei, Xin Xia Zhejiang University DOI |
16:00 - 17:30 | Formal Analysis and Symbolic ExecutionResearch Papers / Tool Demonstrations at Aurora C Chair(s): Na Meng Virginia Tech | ||
16:00 25mTalk | Model Checking Guided Incremental Testing for Distributed Systems Research Papers Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dong Wang Institute of software, Chinese academy of sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Wenhan Feng Institute of Software, Chinese Academy of Sciences, Yu Liang Institute of Software Chinese Academy of Sciences, Yuan Feng Wuhan Dameng Database Co., Ltd, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:25 25mTalk | Identifying Multi-Parameter Constraint Errors in Python Data Science Library API Documentations Research Papers Xiufeng Xu Nanyang Technological University, Fuman Xie University of Queensland, Chenguang Zhu Meta AI, Guangdong Bai University of Queensland, Sarfraz Khurshid University of Texas at Austin, Yi Li Nanyang Technological University DOI Pre-print | ||
16:50 25mTalk | Freesia: Verifying Correctness of TEE Communication with Concurrent Separation Logic Research Papers Fanlang Zeng Zhejiang University, Rui Chang Zhejiang University, Hongjian Liu Zhejiang University, Hangzhou, China DOI | ||
17:15 15mDemonstration | TBFV4J: An Automated Testing-Based Formal Verification Tool for Java Tool Demonstrations |
16:00 - 17:15 | |||
16:00 25mTalk | xFUZZ: A Flexible Framework for Fine-Grained, Runtime-Adaptive Fuzzing Strategy Composition Research Papers DongSong Yu Zhongguancun Laboratory, Yiyi Wang Tsinghua University, Huazhong University of Science and Technology, Chao Zhang Tsinghua University, Yang Lan , Zhiyuan Jiang National University of Defense Technology, Shuitao Gan Labortory for Advanced Computing and Intelligence Engineering, Zheyu Ma Tsinghua University, Wende Tan Tsinghua University DOI | ||
16:25 25mTalk | KRAKEN: Program-Adaptive Parallel Fuzzing Research Papers Anshunkang Zhou Hong Kong University of Science and Technology, Heqing Huang City University of Hong Kong, Charles Zhang Hong Kong University of Science and Technology DOI Pre-print | ||
16:50 25mTalk | Quantum Concolic Testing Research Papers Shangzhou Xia Kyushu University, Jianjun Zhao Kyushu University, Fuyuan Zhang Kyushu University, Xiaoyu Guo Kyushu University DOI |
17:30 - 18:00 | |||
17:30 30mTalk | Huawei Sponsor Talk Plenary Events |
19:00 - 22:00 | |||
19:00 3hSocial Event | Reception Plenary Events |
Thu 26 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
09:00 - 10:30 | |||
09:00 90mKeynote | Correctness Matters: Automatic Program Transformation in the Age of Generative AI Plenary Events Claire Le Goues Carnegie Mellon University |
11:00 - 13:00 | Inclusion SessionPlenary Events at Aurora A The session will have 4 talks at the beginning followed by a guided networking session. The presentations will be 15 minutes each with the speakers and topics as below: Presentation 1 – Online: Cathrine Einarsson with “The Costs of Digital Inclusion (an ecosystem map)” Presentation 2 – Online: Sam Malek with some selected work on “Software Accessibility Testing” Presentation 3 – Online: Antonio Ferreira Martinez with an industry view on “Software Accessibility Testing at DEO” Presentation 4 – In person: Ibrahim El Shemy with “Inclusive Software for Neurodivergence” Guided Networking – 1h | ||
11:00 2hSocial Event | Software Inclusivity and Networking Plenary Events |
11:00 - 12:15 | |||
11:00 25mTalk | Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Research Papers Niklas Risse Max-Planck-Institute for Security and Privacy, Jing Liu Max Planck Institute for Security and Privacy, Marcel Böhme MPI for Security and Privacy DOI Pre-print | ||
11:25 25mTalk | SoK: A Taxonomic Analysis of DeFi Rug Pulls - Types, Dataset, and Tool Assessment Research Papers Dianxiang Sun Nanyang Technological University, Wei Ma , Liming Nie , Yang Liu Nanyang Technological University DOI | ||
11:50 25mTalk | Recurring Vulnerability Detection: How Far Are We? Research Papers Yiheng Cao Fudan University, Susheng Wu Fudan University, Ruisi Wang Fudan University, Bihuan Chen Fudan University, Yiheng Huang Fudan University, Chenhao Lu Fudan University, Zhuotong Zhou Fudan University, Xin Peng Fudan University DOI |
11:00 - 12:15 | Bugs and Repository MiningResearch Papers at Cosmos 3B Chair(s): Shiyi Wei University of Texas at Dallas | ||
11:00 25mTalk | LLM4SZZ: Enhancing SZZ Algorithm with Context-Enhanced Assessment on Large Language Models Research Papers Lingxiao Tang Zhejiang University, Jiakun Liu Singapore Management University, Zhongxin Liu Zhejiang University, Xiaohu Yang Zhejiang University, Lingfeng Bao Zhejiang University DOI | ||
11:25 25mTalk | Walls Have Ears: Demystifying Notification Listener Usage in Android Apps Research Papers Jiapeng Deng Huazhong University of Science and Technology, Tianming Liu Monash Univerisity, Yanjie Zhao Huazhong University of Science and Technology, Chao Wang University of Science and Technology of China, Lin Zhang The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC), Haoyu Wang Huazhong University of Science and Technology DOI | ||
11:50 25mTalk | An Investigation on Numerical Bugs in GPU Programs Towards Automated Bug Detection Research Papers Ravishka Shemal Rathnasuriya The University of Texas - Dallas, Nidhi Majoju University of Texas at Dallas, Zihe Song University of Texas at Dallas, Wei Yang UT Dallas DOI |
11:00 - 12:30 | Test Automation, Evolution, and API TestingResearch Papers / Tool Demonstrations at Cosmos 3C Chair(s): Alexi Turcotte CISPA | ||
11:00 25mTalk | You Name It, I Run It: An LLM Agent to Execute Tests of Arbitrary Projects Research Papers DOI | ||
11:25 25mTalk | Effective REST APIs Testing with Error Message Analysis Research Papers Lixin Xu Nanjing University, China, Huayao Wu Nanjing University, Zhenyu Pan , Tongtong Xu Huawei, Shaohua Wang Central University of Finance and Economics, Xintao Niu Nanjing University, Changhai Nie Nanjing University DOI | ||
11:50 25mTalk | REACCEPT: Automated Co-evolution of Production and Test Code Based on Dynamic Validation and Large Language Models Research Papers Jianlei Chi , Xiaotian Wang Harbin Engineering University, Yuhan Huang Xidian University, Lechen Yu Microsoft, Di Cui Xidian University, Jianguo Sun Xidian University, Jun Sun Singapore Management University DOI | ||
12:15 15mDemonstration | PatchScope – A Modular Tool for Annotating and Analyzing Contributions Tool Demonstrations Jakub Narębski Nicolaus Copernicus University in Toruń, Mikołaj Fejzer Nicolaus Copernicus University in Toruń, Krzysztof Stencel University of Warsaw, Piotr Przymus Nicolaus Copernicus University in Toruń, Poland Link to publication DOI |
11:00 - 12:15 | |||
11:00 25mTalk | Enhanced Prompting Framework for Code Summarization with Large Language Models Research Papers Minying Fang Qingdao University of Science and Technology, Xing Yuan Qingdao University of Science and Technology, Yuying Li Qingdao University of Science and Technology, Haojie Li Qingdao University of Science and Technology, Chunrong Fang Nanjing University, Junwei Du Qingdao University of Science and Technology DOI | ||
11:25 25mTalk | CrossProbe: LLM-empowered Cross-Project Bug Detection for Deep Learning Frameworks Research Papers Hao Guan University of Queensland, Southern University of Science and Technology, Guangdong Bai University of Queensland, Yepang Liu Southern University of Science and Technology DOI | ||
11:50 25mTalk | Safe4U: Identifying Unsound Safe Encapsulations of Unsafe Calls in Rust using LLMs Research Papers Huan Li Zhejiang University, China, Bei Wang Zhejiang University, China, Xing Hu Zhejiang University, Xin Xia Zhejiang University DOI |
14:00 - 15:15 | Extended Reality and Autonomous SystemsResearch Papers at Cosmos 3A Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign | ||
14:00 25mTalk | Assessing Scene Generation Techniques for Testing COLREGS-Compliance of Autonomous Surface Vehicles Research Papers Dominik Frey Linköping University, Ulf Kargén Linköping University, Daniel Varro Linköping University / McGill University DOI | ||
14:25 25mTalk | Reinforcement Learning-based Fuzz Testing for the Gazebo Robotic Simulator Research Papers Zhilei Ren Dalian University of Technology, Yitao Li Dalian University of Technology, Xiaochen Li Dalian University of Technology, Guanxiao Qi Dalian University of Technology, Jifeng Xuan Wuhan University, He Jiang Dalian University of Technology DOI | ||
14:50 25mTalk | Extended Reality Cybersickness Assessment via User Review Analysis Research Papers Shuqing Li The Chinese University of Hong Kong, Qisheng Zheng Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, jiafeng Harbin Institute of Technology, Michael Lyu Chinese University of Hong Kong DOI |
14:00 - 15:15 | Program Analysis 1Research Papers at Cosmos 3B Chair(s): Martin Kellogg New Jersey Institute of Technology | ||
14:00 25mTalk | Bridge the Islands: Pointer Analysis for Microservice Systems Research Papers Teng Zhang Nanjing University, Yufei Liang Nanjing University, Ganlin Li Nanjing University, Tian Tan Nanjing University, Chang Xu Nanjing University, Yue Li Nanjing University DOI | ||
14:25 25mTalk | Program Analysis Combining Generalized Bit-Level and Word-Level Abstractions Research Papers Guangsheng Fan National University of Defense Technology, Liqian Chen National University of Defense Technology, Banghu Yin College of Computer, National University of Defense Technology, Changsha, China, Wenyu Zhang National University of Defense Technology, Peisen Yao Zhejiang University, Ji Wang National University of Defense Technology DOI | ||
14:50 25mTalk | Type-Alias Analysis: Enabling LLVM IR with Accurate Types Research Papers Jinmeng Zhou Zhejiang University, Ziyue Pan Zhejiang University, Wenbo Shen Zhejiang University, Xingkai Wang Zhejiang University, Kangjie Lu University of Minnesota, Zhiyun Qian University of California at Riverside, USA DOI |
14:00 - 15:15 | |||
14:00 25mTalk | Are Autonomous Web Agents good testers? Research Papers Antoine Chevrot Smartesting, Alexandre Vernotte Smartesting, Jean-Rémy Falleri Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, Institut Universitaire de France, Xavier Blanc Université de Bordeaux, Bruno Legeard Université de Bourgogne Franche-Comté and Smartesting, Aymeric Cretin Smartesting DOI | ||
14:25 25mTalk | MLLM-Based UI2Code Automation Guided by UI Layout Information Research Papers Fan Wu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Shuqing Li The Chinese University of Hong Kong, Xin-Cheng Wen Harbin Institute of Technology, Qing Liao Harbin Institute of Technology DOI Pre-print | ||
14:50 25mTalk | GUIPilot: A Consistency-based Mobile GUI Testing Approach for Detecting Application-specific Bugs Research Papers Ruofan Liu Shanghai Jiao Tong University; National University of Singapore, Xiwen Teoh National University of Singapore, Yun Lin Shanghai Jiao Tong University, Guanjie Chen Shanghai Jiao Tong University, Ruofei Ren Shanghai Jiao Tong University, Denys Poshyvanyk William & Mary, Jin Song Dong National University of Singapore Link to publication DOI File Attached |
14:00 - 15:30 | Code and Documentation GenerationResearch Papers / Tool Demonstrations at Cosmos Hall Chair(s): Ying Zou Queen's University, Kingston, Ontario | ||
14:00 25mTalk | The First Prompt Counts the Most! An Evaluation of Large Language Models on Iterative Example-based Code Generation Research Papers Yingjie Fu Peking University, Bozhou Li Peking University, Linyi Li Simon Fraser University, Wentao Zhang Peking University, Tao Xie Peking University DOI | ||
14:25 25mTalk | VerLog: Enhancing Release Note Generation for Android Apps using Large Language Models Research Papers Jiawei Guo University at Buffalo, SUNY, Haoran Yang Washington State University, Haipeng Cai University at Buffalo, SUNY DOI | ||
14:50 25mTalk | Can LLMs replace Human Evaluators? An Empirical Study of LLM-as-a-Judge in Software Engineering Tasks Research Papers Ruiqi Wang Harbin Institute of Technology, Shenzhen, Jiyu Guo Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Guodong Fan Shandong Agriculture and Engineering University, Chun Yong Chong Huawei, Xin Xia Zhejiang University DOI Pre-print | ||
15:15 15mDemonstration | Code2API: A Tool for Generating Reusable APIs from Stack Overflow Code Snippets Tool Demonstrations Yubo Mai Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Xing Hu Zhejiang University, Lingfeng Bao Zhejiang University, Jingyuan Chen , JianLing Sun Zhejiang University |
16:00 - 17:15 | |||
16:00 25mTalk | Program Feature-based Benchmarking for Fuzz Testing Research Papers Miao Miao The University of Texas at Dallas, Sriteja Kummita Fraunhofer Institute for Mechatronic Systems Design (Fraunhofer IEM), Eric Bodden Heinz Nixdorf Institute at Paderborn University; Fraunhofer IEM, Shiyi Wei University of Texas at Dallas DOI | ||
16:25 25mTalk | Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-based RAG Research Papers Zhiyu Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Longxing Li Institute of Information Engineering, Chinese Academy of Sciences, China, Ruigang Liang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:50 25mTalk | Structure-Aware, Diagnosis-Guided ECU Firmware Fuzzing Research Papers Qicai Chen Fudan University, China, Kun Hu School of Computer Science, Fudan University, Sichen Gong Fudan University, China, Bihuan Chen Fudan University, kevin kong Fudan University, Haowen Jiang Fudan University, China, Bingkun Sun Fudan University, You Lu Fudan University, Xin Peng Fudan University DOI |
16:00 - 17:15 | Decompilation and TracingResearch Papers at Cosmos 3B Chair(s): Philipp Straubinger University of Passau | ||
16:00 25mTalk | DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code Research Papers WONG Wai Kin Hong Kong University of Science and Technology, Daoyuan Wu Hong Kong University of Science and Technology, Huaijin Wang Ohio State University, Li Zongjie Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen Lab DOI | ||
16:25 25mTalk | DataHook: An Efficient and Lightweight System Call Hooking Technique without Instruction Modification Research Papers Quan Hong Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, Jiaqi Li Institute of Information Engineering, Chinese Academy of Sciences, Wen Zhang China Unicom Online Information Technology CO.,Ltd, Lidong Zhai Institute of Information Engineering, Chinese Academy of Sciences DOI | ||
16:50 25mTalk | Tracezip: Efficient Distributed Tracing via Trace Compression Research Papers Zhuangbin Chen Sun Yat-sen University, Junsong Pu Beijing University of Posts and Telecommunication, Zibin Zheng Sun Yat-sen University DOI |
16:00 - 17:15 | Code Generation with LLMsResearch Papers at Cosmos 3C Chair(s): Yutian Tang University of Glasgow, United Kingdom | ||
16:00 25mTalk | OmniGIRL: A Multilingual and Multimodal Benchmark for GitHub Issue Resolution Research Papers Lianghong Guo Sun Yat-sen University, Wei Tao Independent Researcher, Runhan Jiang Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Xilin Liu Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies, Mingzhi Mao Sun Yat-sen University, Hongyu Zhang Chongqing University, Zibin Zheng Sun Yat-sen University DOI | ||
16:25 25mTalk | ConTested: Consistency-Aided Tested Code Generation with LLM Research Papers Jinhao Dong Peking University, Jun Sun Singapore Management University, Wenjie Zhang National University of Singapore, Jin Song Dong National University of Singapore, Dan Hao Peking University DOI Pre-print | ||
16:50 25mTalk | Causality-Aided Evaluation and Explanation of Large Language Model-based Code Generation Research Papers Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Li Zongjie Hong Kong University of Science and Technology, Zhaoyu Wang HKUST, Shuai Wang Hong Kong University of Science and Technology DOI |
19:00 - 22:00 | |||
19:00 3hSocial Event | Banquet Plenary Events |
Fri 27 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
09:00 - 10:30 | |||
09:00 90mTalk | An Analysis of Patch Plausibility and Correctness for Generate-and-validate Patch Generation Systems (ISSTA MIP Talk) Plenary Events Zichao Qi MIT, Fan Long University of Toronto, Sara Achour Stanford University, Martin C. Rinard Massachusetts Institute of Technology |
11:00 - 12:15 | |||
11:00 25mTalk | Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Research Papers Lei Yu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Zhirong Huang Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Hang Yuan Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Shiqi Cheng Institute of Software, Chinese Academy of Sciences, China, Li Yang Institute of Software, Chinese Academy of Sciences, Fengjun Zhang Institute of Software, Chinese Academy of Sciences, China, Chenjie Shen Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Jiajia Ma Institute of Software, Chinese Academy of Sciences, China, Jingyuan Zhang Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Junyi Lu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Chun Zuo Sinosoft DOI | ||
11:25 25mTalk | Enhancing Smart Contract Security Analysis with Execution Property Graphs Research Papers Kaihua Qin Yale University, Zhe Ye UC Berkeley, Zhun Wang UC Berkeley, Weilin Li University College London, Liyi Zhou The University of Sydney, Chao Zhang Tsinghua University, Dawn Song UC Berkeley, Arthur Gervais Imperial College London DOI | ||
11:50 25mTalk | The Incredible Shrinking Context... in a decompiler near you Research Papers Sifis Lagouvardos University of Athens, Yannis Bollanos Dedaub, Neville Grech Dedaub Limited, Yannis Smaragdakis University of Athens DOI Pre-print |
11:00 - 12:15 | |||
11:00 25mTalk | Bridging the Gaps Between Graph Neural Networks and Data-Flow Analysis: The Closer, the Better Research Papers Qingchen Yu Zhejiang University, Xin Liu Lanzhou University, Qingguo Zhou Lanzhou University, Chunming Wu Zhejiang University DOI | ||
11:25 25mTalk | Clause2Inv: A Generate-Combine-Check Framework for Loop Invariant Inference Research Papers Weining Cao Nanjing University, China, Guangyuan Wu Nanjing University, China, Tangzhi Xu Nanjing University, China, Yuan Yao Nanjing University, Hengfeng Wei State Key Laboratory for Novel Software Technology, Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma Nanjing University DOI | ||
11:50 25mTalk | Incremental Verification of Concurrent Programs through Refinement Constraint Adaptation Research Papers Liangze Yin National University of Defense Technology, Yiwei Li , Kun Chen National University of Defense Technology, Wei Dong National University of Defense Technology, Ji Wang National University of Defense Technology DOI |
11:00 - 12:15 | |||
11:00 25mTalk | KEENHash: Hashing Programs into Function-aware Embeddings for Large-scale Binary Code Similarity Analysis Research Papers Zhijie Liu ShanghaiTech University, China, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen Lab, Liangfeng Zhang School of Information Science and Technology, ShanghaiTech University, Yutian Tang University of Glasgow, United Kingdom DOI | ||
11:25 25mTalk | Porting Software Libraries to OpenHarmony: Transitioning from TypeScript or JavaScript to ArkTS Research Papers Bo Zhou Northeastern University, Jiaqi Shi Northeastern University, Ying Wang Northeastern University, Li Li Beihang University, Li Tsz On The Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China DOI | ||
11:50 25mTalk | STRUT: Structured Seed Case Guided Unit Test Generation for C Programs using LLMs Research Papers Jinwei Liu Xidian University, Chao Li Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Rui Chen Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Shaofeng Li Xidian University, Bin Gu Beijing Institute of Control Engineering, Mengfei Yang China Academy of Space Technology DOI |
11:00 - 12:05 | Empirical StudiesTool Demonstrations / Research Papers at Cosmos Hall Chair(s): Miryung Kim UCLA and Amazon Web Services | ||
11:00 25mTalk | Fixing Outside the Box: Uncovering Tactics for Open-Source Security Issue Management Research Papers Lyuye Zhang Nanyang Technological University, Wu Jiahui , Chengwei Liu Nanyang Technological University, Kaixuan Li Nanyang Technological University, Xiaoyu Sun Australian National University, Australia, Lida Zhao Nanyang Technological University, Chong Wang Nanyang Technological University, Yang Liu Nanyang Technological University DOI | ||
11:25 25mTalk | More Effective JavaScript Breaking Change Detection via Dynamic Object Relation Graph Research Papers Dezhen Kong Zhejiang University, Jiakun Liu Singapore Management University, Chao Ni Zhejiang University, David Lo Singapore Management University, Lingfeng Bao Zhejiang University DOI | ||
11:50 15mDemonstration | LiPSBOMaker: A Prototype of Multi-Stage Linux Distribution Package SBOM Generator Tool Demonstrations Tong Qiu , Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences |
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Catering |
12:30 - 14:00 | |||
12:30 90mTalk | ISSTA Steering Commitee Meeting Meetings |
14:00 - 15:30 | AI TestingResearch Papers / Tool Demonstrations at Cosmos 3A Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
14:00 25mTalk | AudioTest: Prioritizing Audio Test Cases Research Papers Yinghua Li University of Luxembourg, Xueqi Dang University of Luxembourg, SnT, Wendkuuni Arzouma Marc Christian OUEDRAOGO University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg DOI Media Attached | ||
14:25 25mTalk | S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models Research Papers Xiaohan Yuan Zhejiang University, Jinfeng Li Alibaba Group, Dongxia Wang Zhejiang University, Yuefeng Chen Alibaba Group, Xiaofeng Mao Alibaba Group, Longtao Huang Alibaba Group, Jialuo Chen Zhejiang University, Hui Xue Alibaba Group, Xiaoxia Liu Zhejiang University, Wenhai Wang Zhejiang University, Kui Ren Zhejiang University, Jingyi Wang Zhejiang University DOI | ||
14:50 25mTalk | Improving Deep Learning Framework Testing with Model-Level Metamorphic Testing Research Papers Yanzhou Mu , Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Xiang Chen Nantong University, Zhixiang Cao Xi'an Jiaotong University, Peiran Yang Nanjing University, Kexin Zhao Nanjing University, An Guo Nanjing University, Zhenyu Chen Nanjing University DOI | ||
15:15 15mDemonstration | ASTRAL: A Tool for the Automated Safety Testing of Large Language Models Tool Demonstrations Miriam Ugarte Mondragon University, Pablo Valle Mondragon University, José Antonio Parejo Maestre Universidad de Sevilla, Sergio Segura SCORE Lab, I3US Institute, Universidad de Sevilla, Seville, Spain, Aitor Arrieta Mondragon University |
14:00 - 15:30 | Binary Code Analysis and OptimizationResearch Papers / Tool Demonstrations at Cosmos 3B Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
14:00 25mTalk | BinQuery: A Novel Framework for Natural Language-Based Binary Code Retrieval Research Papers Bolun Zhang Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China, Zeyu Gao Tsinghua University, Hao Wang Tsinghua University, Yuxin Cui Institute for Network Sciences and Cyberspace, Tsinghua University, Siliang Qin Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China, Chao Zhang Tsinghua University, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Beibei Zhao Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China DOI | ||
14:25 25mTalk | Wemby’s Web: Hunting for Memory Corruption in WebAssembly Research Papers Oussama Draissi University of Duisburg-Essen, Tobias Cloosters University of Duisburg-Essen, David Klein TU Braunschweig, Michael Rodler Amazon Web Services, Marius Musch TU Braunschweig, Martin Johns TU Braunschweig, Lucas Davi University of Duisburg-Essen DOI | ||
14:50 25mTalk | Doctor: Optimizing Container Rebuild Efficiency by Instruction Re-Orchestration Research Papers Zhiling Zhu Zhejiang University of Technology, Tieming Chen Zhejiang University of Technology, Chengwei Liu Nanyang Technological University, Han Liu The Hong Kong University of Science and Technology, Qijie Song Zhejiang University of Technology, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Yang Liu Nanyang Technological University DOI | ||
15:15 15mDemonstration | ReGraph: A Tool for Binary Similarity Identification Tool Demonstrations |
14:00 - 15:30 | Gamification, Specifications, and Code ReviewsResearch Papers / Tool Demonstrations at Cosmos 3C Chair(s): Michael Pradel University of Stuttgart | ||
14:00 25mTalk | NADA: Neural Acceptance-driven Approximate Specification Mining Research Papers Weilin Luo Sun Yat-sen University, Tingchen Han Sun Yat-Sen University, Junming Qiu Sun Yat-sen University, Hai Wan Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Bo Peng Sun Yat-Sen University, Guohui Xiao Southeast University, Yanan Liu SUN YAT-SEN UNIVERSITY DOI | ||
14:25 25mTalk | Gamifying Testing in IntelliJ: A Replicability Study Research Papers Philipp Straubinger University of Passau, Tommaso Fulcini Politecnico di Torino, Giacomo Garaccione Politecnico di Torino, Luca Ardito Politecnico di Torino, Gordon Fraser University of Passau DOI | ||
14:50 25mTalk | DeCoMa: Detecting and Purifying Code Dataset Watermarks through Dual Channel Code Abstraction Research Papers Yuan Xiao Nanjing University, Yuchen Chen Nanjing University, Shiqing Ma University of Massachusetts at Amherst, Haocheng Huang Soochow University, Chunrong Fang Nanjing University, Yanwei Chen Nanjing University, Weisong Sun Nanyang Technological University, Yunfeng Zhu Nanjing University, Xiaofang Zhang Soochow University, Zhenyu Chen Nanjing University DOI Pre-print | ||
15:15 15mDemonstration | Teaching Software Testing and Debugging with the Serious Game Sojourner under Sabotage Tool Demonstrations Philipp Straubinger University of Passau, Tim Greller University of Passau, Gordon Fraser University of Passau |
16:00 - 17:15 | Smart Contracts 2Research Papers at Cosmos 3B Chair(s): Zhenbang Chen College of Computer, National University of Defense Technology | ||
16:00 25mTalk | OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum Virtual Machine Research Papers Jie Ma Beihang University; Zhongguancun Laboratory, Ningyu He Hong Kong Polytechnic University, Jinwen Xi , Mingzhe Xing Zhongguancun Laboratory, Haoyu Wang Huazhong University of Science and Technology, Ying Gao School of Cyber Science and Technology, Beihang University; Zhongguancun Laboratory, Yinliang Yue Zhongguancun Laboratory DOI | ||
16:25 25mTalk | Why Does My Transaction Fail? A First Look at Failed Transactions on the Solana Blockchain Research Papers Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, David Lo Singapore Management University, Difan Xie Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Xiaohu Yang Zhejiang University DOI | ||
16:50 25mTalk | Automated Attack Synthesis for Constant Product Market Makers Research Papers DOI Pre-print |
16:00 - 17:30 | Fuzzing and Search-Based TestingResearch Papers / Tool Demonstrations at Cosmos 3C Chair(s): Thuan Pham University of Melbourne | ||
16:00 25mTalk | ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference Research Papers Yuchong Xie Hong Kong University of Science and Technology, Wenhui Zhang Hunan University, Changsha, China, Dongdong She HKUST (The Hong Kong University of Science and Technology) DOI | ||
16:25 25mTalk | WildSync: Automated Fuzzing Harness Synthesis via Wild API Usage Recovery Research Papers DOI | ||
16:50 25mTalk | FANDANGO: Evolving Language-Based Testing Research Papers José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, Marius Smytzek CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security Link to publication DOI | ||
17:15 15mDemonstration | XAVIER: Grammar-Based Testing for XML Injection Attacks Tool Demonstrations Paul Kalbitzer , José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security |
17:30 - 17:45 | |||
17:30 15mDay closing | Closing Session for ISSTA 25 Plenary Events Mike Papadakis University of Luxembourg |
19:00 - 19:45 | |||
19:00 45mSocial Event | Organ Concert Plenary Events |
Sat 28 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
09:00 - 18:00 | CPAchecker WorkshopWorkshops at Cosmos 3A For the CPAchecker workshop program, please refer to the workshop website directly: https://cpa.sosy-lab.org/2025/. | ||
09:00 - 10:30 | Trustworthy AI for CodeEXPRESS at Cosmos 3B Chair(s): Peng Di Ant Group & UNSW Sydney, Puzhuo Liu Ant Group & Tsinghua University | ||
09:00 10mDay opening | Opening and Welcome EXPRESS | ||
09:10 60mKeynote | Human-like AI Auditor for Code Repositories EXPRESS Xiangyu Zhang Purdue University | ||
10:10 20mTalk | FuseApplyBench: Multilingual Benchmark for Trustworthy Code Edit Applying Task EXPRESS Ming Liang Ant Group, Qingyu Zhang the University of Hong Kong, Zhipeng Zuo Ant Group, Shaoqiang Zheng Ant Group, Dajun Chen Ant Group, Wei Jiang Ant Group, Yong Li Ant Group |
09:00 - 10:30 | |||
09:00 10mDay opening | Welcome FUZZING | ||
09:10 50mKeynote | Keynote: Constraining Fuzzing without Paying Too Much FUZZING Miryung Kim UCLA and Amazon Web Services | ||
10:00 10mTalk | Personalized Fuzzing: A Case Study with the FANDANGO Fuzzer on a GNSS Module FUZZING Stephan Neuhaus ZHAW School of Engineering, José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security | ||
10:10 10mTalk | Hybrid Fuzzing of Infrastructure as Code Programs FUZZING Emilio Coppa LUISS University, Daniel Sokolowski University of St. Gallen, Guido Salvaneschi University of St. Gallen | ||
10:20 10mTalk | Towards Fuzzing Zero-Knowledge Proof Circuits FUZZING Stefanos Chaliasos Imperial College London, Imam Al-Fath ZKSecurity, Alastair F. Donaldson Imperial College London |
09:00 - 18:00 | LLMSC WorkshopWorkshops at Cosmos 3D For the LLMSC workshop program, please refer to the workshop website directly: https://llmsc.github.io/. | ||
11:00 - 12:30 | Intelligence and PrivacyEXPRESS at Cosmos 3B Chair(s): Peng Di Ant Group & UNSW Sydney, Puzhuo Liu Ant Group & Tsinghua University | ||
11:00 20mTalk | Patch the Leak: Strengthening CodeLLMs Against Privacy Extraction Threats EXPRESS Yongjian Guo Tsinghua University & Ant Group, Wanlun Ma Swinburne University of Technology, Xi Xiao Tsinghua University, Sheng Wen Swinburne University of Technology, Peng Di Ant Group & UNSW Sydney, Xiaogang Zhu The University of Adelaide | ||
11:20 20mTalk | From Large Language Models to Adversarial Malware: How far are we EXPRESS Shuai He Huazhong University of Science and Technology, Hao Yan Huazhong University of Science and Technology, Wenke Li Huazhong University of Science and Technology, Sheng Hong Huazhong University of Science and Technology, Xiaowei Guo Huazhong University of Science and Technology, Xiaofan Liu Huazhong University of Science and Technology, Cai Fu Huazhong University of Science and Technology | ||
11:40 20mTalk | Towards Source Mapping for Zero-Knowledge Smart Contracts: Design and Preliminary Evaluation EXPRESS Pei Xu University of Technology Sydney, Yulei Sui University of New South Wales, Mark Staples Digital Finance CRC | ||
12:00 20mTalk | TestFlow: Advancing Mobile UI Testing through Multi-Step Reinforcement Learning EXPRESS Xiaoxuan Tang Ant Group, Xinfang Chen Ant Group, Dajun Chen Ant Group, Sheng Zhou Zhejiang University, Wei Jiang Ant Group, Yong Li Ant Group | ||
12:20 10mDay closing | Discussion and Conclusion EXPRESS |
11:00 - 13:00 | |||
11:00 50mKeynote | Keynote: Are you sure you belong in academia? FUZZING | ||
12:00 60mPanel | Panel Discussion: Fuzzing in Research vs. Industry FUZZING |
16:00 - 16:10 | |||
16:00 10mDay closing | Concluding Remarks FUZZING |