ISSTA 2025 Program
Wed 25 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
| 08:45 - 09:00 | |||
| 08:4515m Day opening | Welcome to ISSTA 2025 Plenary Events Mike Papadakis University of Luxembourg | ||
| 09:00 - 09:30 | |||
| 09:0030m Awards | SIGSOFT Impact Award Plenary Events | ||
| 09:30 - 10:30 | |||
| 09:3060m Keynote | Leveraging Latent-space Generative Models for Testing Plenary Events Matthew B Dwyer University of Virginia | ||
| 11:00 - 12:30 | |||
| 11:0015m Day opening | Opening Remarks Doctoral Symposium C: Andreas Zeller CISPA Helmholtz Center for Information Security, C: Darko Marinov University of Illinois at Urbana-Champaign, C: Jie M. Zhang King's College London, C: Federica Sarro University College London | ||
| 11:1545m Keynote | Research and Impact in Academia and Industry Doctoral Symposium Mark Harman Meta Platforms, Inc. and UCL | ||
| 12:0015m Talk | Job Talk #1: Search-based Software Testing Driven by Domain Knowledge Doctoral Symposium | ||
| 12:1515m Talk | Job Talk #2: Regression Fault Detection and Mitigation in the Evolution of Deep Learning Systems Doctoral Symposium | ||
| 11:00 - 12:30 | Program RepairTool Demonstrations / Research Papers at Aurora A  Chair(s): Yannic Noller Ruhr University Bochum | ||
| 11:0025m Talk | LLM Hallucinations in Practical Code Generation: Phenomena, Mechanism, and Mitigation Research Papers Ziyao Zhang Sun Yat-sen University, Chong Wang Nanyang Technological University, Yanlin Wang Sun Yat-sen University, Ensheng Shi Xi’an Jiaotong University, Yuchi Ma Huawei Cloud Computing Technologies, Wanjun Zhong Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Mingzhi Mao Sun Yat-sen University, Zibin Zheng Sun Yat-sen UniversityDOI | ||
| 11:2525m Talk | AdverIntent-Agent: Adversarial Reasoning for Repair Based on Inferred Program Intent Research Papers He Ye University College London (UCL), Aidan Z.H. Yang Carnegie Mellon University, Chang Hu Macau University of Science and Technology, Yanlin Wang Sun Yat-sen University, Tao Zhang Macau University of Science and Technology, Claire Le Goues Carnegie Mellon UniversityDOI | ||
| 11:5025m Talk | PatchScope: LLM-Enhanced Fine-Grained Stable Patch Classification for Linux Kernel Research Papers Rongkai Liu Central South University, Heyuan Shi Central South University, Shuning Liu Central South University, China, Chao Hu Central South University, Sisheng Li Central South University, China, Yuheng Shen Tsinghua University, Runzhe Wang Alibaba Group, Xiaohai Shi Alibaba Group, Yu Jiang Tsinghua UniversityDOI | ||
| 12:1515m Demonstration | InfraFix: Technology-Agnostic Repair of Infrastructure as Code Tool Demonstrations Nuno Saavedra INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC | ||
| 11:00 - 12:15 | |||
| 11:0025m Talk | Beyond Static Pattern Matching? Rethinking Automatic Cryptographic API Misuse Detection in the Era of LLMs Research Papers Yifan Xia , Zichen Xie Zhejiang University, China, Peiyu Liu Zhejiang University, Kangjie Lu University of Minnesota, Yan Liu Ant Group, Wenhai Wang Zhejiang University, Shouling Ji Zhejiang UniversityDOI | ||
| 11:2525m Talk | Pepper: Preference-Aware Active Trapping for Ransomware Research Papers Huan Zhang Institute of Information Engineering, Chinese Academy of Sciences, Zhengkai Qin Institute of Information Engineering,Chinese Academy of Sciences, Lixin Zhao Institute of Information Engineering,Chinese Academy of Sciences, Aimin Yu Institute of Information Engineering, Chinese Academy of Sciences, Lijun Cai Institute of Information Engineering,Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of SciencesDOI | ||
| 11:5025m Talk | ICEPRE: ICS protocol reverse engineering via data-driven concolic execution Research Papers Yibo Qu Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Zhen Wang Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Jiaxing Cheng Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Shuaizong Si  Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Yongle Chen Taiyuan University of Technology, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of SciencesDOI | ||
| 11:00 - 12:15 | Systems and PerformanceResearch Papers at Aurora C  Chair(s): Lars Grunske Humboldt-Universität zu Berlin | ||
| 11:0025m Talk | Preventing Disruption of System Backup Against Ransomware Attacks Research Papers Yiwei Hou Tsinghua University, Lihua Guo Tsinghua University, Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Wenhuan Liu Tsinghua University/Union Tech, Chengnian Sun University of Waterloo, Yu Jiang Tsinghua UniversityDOI | ||
| 11:2525m Talk | Rethinking Performance Analysis for Configurable Software Systems: A Case Study from a Fitness Landscape Perspective Research Papers Mingyu Huang University of Electronic Science and Technology of China, Peili Mao University of Electronic Science and Technology of China, Ke Li University of ExeterDOI | ||
| 11:5025m Talk | Hulk: Exploring Data-Sensitive Performance Anomalies in DBMSs via Data-Driven Analysis Research Papers Zhiyong Wu Tsinghua University, China, Jie Liang , Jingzhou Fu School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Yu Jiang Tsinghua UniversityDOI | ||
| 11:00 - 12:15 | Fairness and LLM TestingResearch Papers at Cosmos 3A  Chair(s): Andreas Metzger University of Duisburg-Essen | ||
| 11:0025m Talk | Fairness Mediator: Neutralize Stereotype Associations to Mitigate Bias in Large Language Models Research Papers Yisong Xiao Beihang University, Aishan Liu Beihang University; Institute of Dataspace, Siyuan Liang National University of Singapore, Xianglong Liu Beihang University; Institute of Dataspace; Zhongguancun Laboratory, Dacheng Tao Nanyang Technological UniversityDOI | ||
| 11:2525m Talk | ClassEval-T: Evaluating Large Language Models in Class-Level Code Translation Research Papers Pengyu Xue Shandong University, Linhao Wu Shandong University, Zhen Yang Shandong University, Chengyi Wang Shandong University, Xiang Li Shandong University, Yuxiang Zhang Shandong University, Jia Li Tsinghua University, Ruikai Jin Shandong University, Yifei Pei Shandong University, Zhaoyan Shen Shandong University, Xiran Lyu Shandong University, Jacky Keung City University of Hong KongDOI | ||
| 11:5025m Talk | No Bias Left Behind: Fairness Testing for Deep Recommender Systems Targeting General Disadvantaged Groups Research Papers Zhuo Wu Tianjin International Engineering Institute, Tianjin University, Zan Wang Tianjin University, Chuan Luo Beihang University, Xiaoning Du Monash University, Junjie Chen Tianjin UniversityDOI | ||
| 14:00 - 15:15 | Evolution, Continuous Integration, and DeploymentResearch Papers at Aurora A  Chair(s): Laura Plein CISPA Helmholtz Center for Information Security | ||
| 14:0025m Talk | Productively Deploying Emerging Models on Emerging Platforms: A Top-Down Approach for Testing and Debugging Research Papers Siyuan Feng Shanghai Jiao Tong University, Jiawei Liu University of Illinois at Urbana-Champaign, Ruihang Lai Carnegie Mellon University, Charlie F. Ruan Carnegie Mellon University, Yong Yu Shanghai Jiao Tong University, Lingming Zhang University of Illinois at Urbana-Champaign, Tianqi Chen DOI | ||
| 14:2525m Talk | SWE-GPT: A Process-Centric Language Model for Automated Software Improvement Research Papers Yingwei Ma Alibaba Group, Rongyu Cao Tongyi Lab, Alibaba, China, Yongchang Cao Tongyi Lab, Alibaba, China, Yue Zhang Tongyi Lab, Alibaba, China, Jue Chen Tongyi Lab, Alibaba, China, Yibo Liu Tongyi Lab, Alibaba, China, Yuchen Liu Tongyi Lab, Alibaba, China, Binhua Li Tongyi Lab, Alibaba, China, Fei Huang Tongyi Lab, Alibaba, China, Yongbin Li Tongyi Lab, Alibaba, ChinaDOI | ||
| 14:5025m Talk | What Happened in This Pipeline? Diffing Build Logs With CiDiff Research Papers Nicolas Hubner University of Bordeaux, LaBRI, UMR 5800, F-33400, Talence, France, Jean-Rémy Falleri Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, Institut Universitaire de France, Raluca Uricaru Univ. Bordeaux, Bordeaux INP, CNRS, LaBRI, UMR5800, F-33400 Talence, France, Thomas Degueule CNRS, Thomas Durieux TU DelftDOI | ||
| 14:00 - 15:15 | |||
| 14:0025m Talk | MoDitector: Module-Directed Testing for Autonomous Driving Systems Research Papers Renzhi Wang University of Alberta, Mingfei Cheng Singapore Management University, Xiaofei Xie Singapore Management University, Yuan Zhou Zhejiang Sci-Tech University, Lei Ma The University of Tokyo & University of AlbertaDOI | ||
| 14:2525m Talk | RouthSearch: Inferring PID Parameter Specification for Flight Control Program by Coordinate Search Research Papers Siao Wang Fudan University, Zhen Dong Fudan University, Hui Li Fudan University, China, Liwei Shen Fudan University, China, Xin Peng Fudan University, Dongdong She HKUST (The Hong Kong University of Science and Technology)DOI | ||
| 14:5025m Talk | Testing the Fault-Tolerance of Multi-Sensor Fusion Perception in Autonomous Driving Systems Research Papers Haoxiang Tian Institute of Software, Chinese Academy of Sciences, wenqiang ding Nanjing Institute of Software, Nanjing, China, Xingshuo Han Nanyang Technological University, Singapore, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, An Guo Nanjing University, Junqi Zhang University of Science and Technology of China, China, Wei Chen Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tianwei Zhang Nanyang Technological UniversityDOI | ||
| 14:00 - 15:15 | Runtime Analysis, Verification, and SlicingResearch Papers at Aurora C  Chair(s): Heqing Huang City University of Hong Kong | ||
| 14:0025m Talk | Adding Spatial Memory Safety to EDK II through Checked C (Experience Paper) Research Papers Sourag Cherupattamoolayil Purdue University, Arunkumar Bhattar Purdue University, Connor Everett Glosner Purdue University, Aravind Machiry Purdue UniversityDOI | ||
| 14:2525m Talk | LogBase: A Large-Scale Benchmark for Semantic Log Parsing Research Papers Chenbo Zhang Fudan University, Wenying Xu Fudan University, Jinbu Liu Alibaba, Lu Zhang Fudan University, Guiyang Liu Alibaba, Jihong Guan Tongji University, Qi Zhou Alibaba, Shuigeng Zhou Fudan UniversityDOI | ||
| 14:5025m Talk | Static Program Reduction via Type-Directed Slicing Research Papers Loi Ngo Duc Nguyen University of California, Riverside, Tahiatul Islam New Jersey Institute of Technology, Theron Wang The Academy for Mathematics, Science & Engineering, USA, Sam Lenz New Jersey Institute of Technology, Martin Kellogg New Jersey Institute of TechnologyDOI Pre-print | ||
| 14:00 - 15:30 | LLM-based Testing 1Research Papers / Tool Demonstrations at Cosmos 3A  Chair(s): Qingkai Shi Nanjing University | ||
| 14:0025m Talk | A Large-scale Empirical Study on Fine-tuning Large Language Models for Unit Testing Research Papers ye shang Nanjing University, Quanjun Zhang School of Computer Science and Engineering, Nanjing University of Science and Technology, Chunrong Fang Nanjing University, Siqi Gu Nanjing University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Zhenyu Chen Nanjing UniversityDOI | ||
| 14:2525m Talk | Validating Network Protocol Parsers with Traceable RFC Document Interpretation Research Papers Mingwei Zheng Purdue University, Danning Xie Purdue University, Qingkai Shi Nanjing University, Chengpeng Wang Purdue University, Xiangyu Zhang Purdue UniversityDOI | ||
| 14:5025m Talk | Tratto: A Neuro-Symbolic Approach to Deriving Axiomatic Test Oracles Research Papers Davide Molinelli USI Lugano; Schaffhausen Institute of Technology, Alberto Martin-Lopez Software Institute - USI, Lugano, Elliott Zackrone University of Washington, Beyza Eken Sakarya University, Michael D. Ernst University of Washington, Mauro Pezze Università della Svizzera italiana (USI) and Università degli Studi di Milano Bicocca and CIT Constructor Institute of TechnologyDOI Pre-print | ||
| 15:1515m Demonstration | Kitten: A Simple Yet Effective Baseline for Evaluating LLM-Based Compiler Testing Techniques Tool Demonstrations Yuanmin Xie Tsinghua University, Zhenyang Xu University of Waterloo, Yongqiang Tian , Min Zhou , Xintong Zhou University of Waterloo, Chengnian Sun University of Waterloo | ||
| 16:00 - 18:00 | |||
| 16:0060m Live Q&A | Ask Me Anything Doctoral Symposium | ||
| 17:0060m Meeting | Break Out Sessions Doctoral Symposium | ||
| 16:00 - 17:30 | Mobile and Concurrency TestingResearch Papers / Tool Demonstrations at Aurora A  Chair(s): Li Li Beihang University | ||
| 16:0025m Talk | Intention-based GUI Test Migration for Mobile Apps using Large Language Models Research Papers Shaoheng Cao Nanjing University, Minxue Pan Nanjing University, Yuanhong Lan Nanjing University, Xuandong Li Nanjing UniversityDOI | ||
| 16:2525m Talk | GoPV: Detecting Blocking Concurrency Bugs Related to Shared-Memory Synchronization in Go Research Papers Wei Song Nanjing University of Science and Technology, Xiaofan Xu Nanjing University of Science and Technology, Jeff Huang Texas A&M UniversityDOI | ||
| 16:5025m Talk | Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection Research Papers haodong li Beijing University of Posts and Telecommunications, Xiao Cheng Macquarie University, Yanjie Zhao Huazhong University of Science and Technology, Guosheng Xu Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology, Shenzhen, Haoyu Wang Huazhong University of Science and TechnologyDOI | ||
| 17:1515m Demonstration | GoPV: A Static Analyzer for Finding Blocking Concurrency Bugs Due to Misuse of Shared-Memory Synchronization in Go Tool Demonstrations Xiaofan Xu Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University | ||
| 16:00 - 17:15 | Database TestingResearch Papers at Aurora B  Chair(s): Alberto Martin-Lopez Software Institute - USI, Lugano | ||
| 16:0025m Talk | QTRAN: Extending Metamorphic-Oracle based Logical Bug Detection Techniques for Multiple-DBMS Dialect Support Research Papers Li Lin Xiamen University, Qinglin Zhu School of Informatics, Xiamen University, Hongqiao Chen School of Informatics, Xiamen University, Zhuangda Wang Xiamen University, Rongxin Wu Xiamen University, Xiaoheng Xie Ant GroupDOI | ||
| 16:2525m Talk | Detecting Isolation Anomalies in Relational DBMSs Research Papers Rui Yang Institute of Software, Chinese Academy of Sciences, Ziyu Cui Institute of Software at Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiansen Song Institute of Software at Chinese Academy of Sciences, Xudong Xie Institute of Software Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of SciencesDOI | ||
| 16:5025m Talk | Understanding Practitioners’ Expectations on Clear Code Review Comments Research Papers Junkai Chen Singapore Management University, Singapore, Zhenhao Li York University, Qiheng Mao Zhejiang University, Xing Hu Zhejiang University, Kui Liu Huawei, Xin Xia Zhejiang UniversityDOI | ||
| 16:00 - 17:30 | Formal Analysis and Symbolic ExecutionResearch Papers / Tool Demonstrations at Aurora C  Chair(s): Na Meng Virginia Tech | ||
| 16:0025m Talk | Model Checking Guided Incremental Testing for Distributed Systems Research Papers Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dong Wang Institute of software, Chinese academy of sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Wenhan Feng Institute of Software, Chinese Academy of Sciences, Yu Liang Institute of Software Chinese Academy of Sciences, Yuan Feng Wuhan Dameng Database Co., Ltd, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of SciencesDOI | ||
| 16:2525m Talk | Identifying Multi-Parameter Constraint Errors in Python Data Science Library API Documentations Research Papers Xiufeng Xu Nanyang Technological University, Fuman Xie University of Queensland, Chenguang Zhu Meta AI, Guangdong Bai University of Queensland, Sarfraz Khurshid University of Texas at Austin, Yi Li Nanyang Technological UniversityDOI Pre-print | ||
| 16:5025m Talk | Freesia: Verifying Correctness of TEE Communication with Concurrent Separation Logic Research Papers Fanlang Zeng Zhejiang University, Rui Chang Zhejiang University, Hongjian Liu Zhejiang University, Hangzhou, ChinaDOI | ||
| 17:1515m Demonstration | TBFV4J: An Automated Testing-Based Formal Verification Tool for Java Tool Demonstrations | ||
| 16:00 - 17:15 | |||
| 16:0025m Talk | xFUZZ: A Flexible Framework for Fine-Grained, Runtime-Adaptive Fuzzing Strategy Composition Research Papers DongSong Yu Zhongguancun Laboratory, Yiyi Wang Tsinghua University, Huazhong University of Science and Technology, Chao Zhang Tsinghua University, Yang Lan , Zhiyuan Jiang National University of Defense Technology, Shuitao Gan Labortory for Advanced Computing and Intelligence Engineering, Zheyu Ma Tsinghua University, Wende Tan Tsinghua UniversityDOI | ||
| 16:2525m Talk | KRAKEN: Program-Adaptive Parallel Fuzzing Research Papers Anshunkang Zhou Hong Kong University of Science and Technology, Heqing Huang City University of Hong Kong, Charles Zhang Hong Kong University of Science and TechnologyDOI Pre-print | ||
| 16:5025m Talk | Quantum Concolic Testing Research Papers Shangzhou Xia Kyushu University, Jianjun Zhao Kyushu University, Fuyuan Zhang Kyushu University, Xiaoyu Guo Kyushu UniversityDOI | ||
| 17:30 - 18:00 | |||
| 17:3030m Talk | Huawei Sponsor Talk Plenary Events | ||
| 19:00 - 22:00 | |||
| 19:003h Social Event | Reception Plenary Events | ||
Thu 26 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
| 09:00 - 10:30 | |||
| 09:0090m Keynote | Correctness Matters: Automatic Program Transformation in the Age of Generative AI Plenary Events Claire Le Goues Carnegie Mellon University | ||
| 11:00 - 13:00 | Inclusion SessionPlenary Events at Aurora A  The session will have 4 talks at the beginning followed by a guided networking session. The presentations will be 15 minutes each with the speakers and topics as below: Presentation 1 – Online: Cathrine Einarsson with “The Costs of Digital Inclusion (an ecosystem map)” Presentation 2 – Online: Sam Malek with some selected work on “Software Accessibility Testing” Presentation 3 – Online: Antonio Ferreira Martinez with an industry view on “Software Accessibility Testing at DEO” Presentation 4 – In person: Ibrahim El Shemy with “Inclusive Software for Neurodivergence” Guided Networking – 1h | ||
| 11:002h Social Event | Software Inclusivity and Networking Plenary Events | ||
| 11:00 - 12:15 | |||
| 11:0025m Talk | Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Research Papers Niklas Risse Max-Planck-Institute for Security and Privacy, Jing Liu Max Planck Institute for Security and Privacy, Marcel Böhme MPI for Security and PrivacyDOI Pre-print | ||
| 11:2525m Talk | SoK: A Taxonomic Analysis of DeFi Rug Pulls - Types, Dataset, and Tool Assessment Research Papers Dianxiang Sun Nanyang Technological University, Wei Ma , Liming Nie , Yang Liu Nanyang Technological UniversityDOI | ||
| 11:5025m Talk | Recurring Vulnerability Detection: How Far Are We? Research Papers Yiheng Cao Fudan University, Susheng Wu Fudan University, Ruisi Wang Fudan University, Bihuan Chen Fudan University, Yiheng Huang Fudan University, Chenhao Lu Fudan University, Zhuotong Zhou Fudan University, Xin Peng Fudan UniversityDOI | ||
| 11:00 - 12:15 | Bugs and Repository MiningResearch Papers at Cosmos 3B  Chair(s): Shiyi Wei University of Texas at Dallas | ||
| 11:0025m Talk | LLM4SZZ: Enhancing SZZ Algorithm with Context-Enhanced Assessment on Large Language Models Research Papers Lingxiao Tang Zhejiang University, Jiakun Liu Singapore Management University, Zhongxin Liu Zhejiang University, Xiaohu Yang Zhejiang University, Lingfeng Bao  Zhejiang UniversityDOI | ||
| 11:2525m Talk | Walls Have Ears: Demystifying Notification Listener Usage in Android Apps Research Papers Jiapeng Deng Huazhong University of Science and Technology, Tianming Liu Monash Univerisity, Yanjie Zhao Huazhong University of Science and Technology, Chao Wang University of Science and Technology of China, Lin Zhang The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC), Haoyu Wang Huazhong University of Science and TechnologyDOI | ||
| 11:5025m Talk | An Investigation on Numerical Bugs in GPU Programs Towards Automated Bug Detection Research Papers Ravishka Shemal Rathnasuriya The University of Texas - Dallas, Nidhi Majoju University of Texas at Dallas, Zihe Song University of Texas at Dallas, Wei Yang UT DallasDOI | ||
| 11:00 - 12:30 | Test Automation, Evolution, and API TestingResearch Papers / Tool Demonstrations at Cosmos 3C  Chair(s): Alexi Turcotte CISPA | ||
| 11:0025m Talk | You Name It, I Run It: An LLM Agent to Execute Tests of Arbitrary Projects Research PapersDOI | ||
| 11:2525m Talk | Effective REST APIs Testing with Error Message Analysis Research Papers Lixin Xu Nanjing University, China, Huayao Wu Nanjing University, Zhenyu Pan , Tongtong Xu Huawei, Shaohua Wang Central University of Finance and Economics, Xintao Niu Nanjing University, Changhai Nie Nanjing UniversityDOI | ||
| 11:5025m Talk | REACCEPT: Automated Co-evolution of Production and Test Code Based on Dynamic Validation and Large Language Models Research Papers Jianlei Chi , Xiaotian Wang Harbin Engineering University, Yuhan Huang Xidian University, Lechen Yu Microsoft, Di Cui Xidian University, Jianguo Sun Xidian University, Jun Sun Singapore Management UniversityDOI | ||
| 12:1515m Demonstration | PatchScope – A Modular Tool for Annotating and Analyzing Contributions Tool Demonstrations Jakub Narębski Nicolaus Copernicus University in Toruń, Mikołaj Fejzer Nicolaus Copernicus University in Toruń, Krzysztof Stencel University of Warsaw, Piotr Przymus Nicolaus Copernicus University in Toruń, PolandLink to publication DOI | ||
| 11:00 - 12:15 | |||
| 11:0025m Talk | Enhanced Prompting Framework for Code Summarization with Large Language Models Research Papers Minying Fang Qingdao University of Science and Technology, Xing Yuan Qingdao University of Science and Technology, Yuying Li Qingdao University of Science and Technology, Haojie Li Qingdao University of Science and Technology, Chunrong Fang Nanjing University, Junwei Du Qingdao University of Science and TechnologyDOI | ||
| 11:2525m Talk | CrossProbe: LLM-empowered Cross-Project Bug Detection for Deep Learning Frameworks Research Papers Hao Guan University of Queensland, Southern University of Science and Technology, Guangdong Bai University of Queensland, Yepang Liu Southern University of Science and TechnologyDOI | ||
| 11:5025m Talk | Safe4U: Identifying Unsound Safe Encapsulations of Unsafe Calls in Rust using LLMs Research Papers Huan Li Zhejiang University, China, Bei Wang Zhejiang University, China, Xing Hu Zhejiang University, Xin Xia Zhejiang UniversityDOI | ||
| 14:00 - 15:15 | Extended Reality and Autonomous SystemsResearch Papers at Cosmos 3A  Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign | ||
| 14:0025m Talk | Assessing Scene Generation Techniques for Testing COLREGS-Compliance of Autonomous Surface Vehicles Research Papers Dominik Frey Linköping University, Ulf Kargén Linköping University, Daniel Varro Linköping University / McGill UniversityDOI | ||
| 14:2525m Talk | Reinforcement Learning-based Fuzz Testing for the Gazebo Robotic Simulator Research Papers Zhilei Ren Dalian University of Technology, Yitao Li Dalian University of Technology, Xiaochen Li Dalian University of Technology, Guanxiao Qi Dalian University of Technology, Jifeng Xuan Wuhan University, He Jiang Dalian University of TechnologyDOI | ||
| 14:5025m Talk | Extended Reality Cybersickness Assessment via User Review Analysis Research Papers Shuqing Li The Chinese University of Hong Kong, Qisheng Zheng Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, jiafeng  Harbin Institute of Technology, Michael Lyu Chinese University of Hong KongDOI | ||
| 14:00 - 15:15 | Program Analysis 1Research Papers at Cosmos 3B  Chair(s): Martin Kellogg New Jersey Institute of Technology | ||
| 14:0025m Talk | Bridge the Islands: Pointer Analysis for Microservice Systems Research Papers Teng Zhang Nanjing University, Yufei Liang Nanjing University, Ganlin Li Nanjing University, Tian Tan Nanjing University, Chang Xu Nanjing University, Yue Li Nanjing UniversityDOI | ||
| 14:2525m Talk | Program Analysis Combining Generalized Bit-Level and Word-Level Abstractions Research Papers Guangsheng Fan National University of Defense Technology, Liqian Chen National University of Defense Technology, Banghu Yin College of Computer, National University of Defense Technology, Changsha, China, Wenyu Zhang National University of Defense Technology, Peisen Yao Zhejiang University, Ji Wang National University of Defense TechnologyDOI | ||
| 14:5025m Talk | Type-Alias Analysis: Enabling LLVM IR with Accurate Types Research Papers Jinmeng Zhou Zhejiang University, Ziyue Pan Zhejiang University, Wenbo Shen Zhejiang University, Xingkai Wang Zhejiang University, Kangjie Lu University of Minnesota, Zhiyun Qian University of California at Riverside, USADOI | ||
| 14:00 - 15:15 | |||
| 14:0025m Talk | Are Autonomous Web Agents good testers? Research Papers Antoine Chevrot Smartesting, Alexandre Vernotte Smartesting, Jean-Rémy Falleri Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, Institut Universitaire de France, Xavier Blanc Université de Bordeaux, Bruno Legeard Université de Bourgogne Franche-Comté and Smartesting, Aymeric Cretin SmartestingDOI | ||
| 14:2525m Talk | MLLM-Based UI2Code Automation Guided by UI Layout Information Research Papers Fan Wu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Shuqing Li The Chinese University of Hong Kong, Xin-Cheng Wen Harbin Institute of Technology, Qing Liao Harbin Institute of TechnologyDOI Pre-print | ||
| 14:5025m Talk | GUIPilot: A Consistency-based Mobile GUI Testing Approach for Detecting Application-specific Bugs Research Papers Ruofan Liu Shanghai Jiao Tong University; National University of Singapore, Xiwen Teoh National University of Singapore, Yun Lin Shanghai Jiao Tong University, Guanjie Chen Shanghai Jiao Tong University, Ruofei Ren Shanghai Jiao Tong University, Denys Poshyvanyk William & Mary, Jin Song Dong National University of SingaporeLink to publication DOI File Attached | ||
| 14:00 - 15:30 | Code and Documentation GenerationResearch Papers / Tool Demonstrations at Cosmos Hall  Chair(s): Ying Zou Queen's University, Kingston, Ontario | ||
| 14:0025m Talk | The First Prompt Counts the Most! An Evaluation of Large Language Models on Iterative Example-based Code Generation Research Papers Yingjie Fu Peking University, Bozhou Li Peking University, Linyi Li Simon Fraser University, Wentao Zhang Peking University, Tao Xie Peking UniversityDOI | ||
| 14:2525m Talk | VerLog: Enhancing Release Note Generation for Android Apps using Large Language Models Research Papers Jiawei Guo University at Buffalo, SUNY, Haoran Yang Washington State University, Haipeng Cai University at Buffalo, SUNYDOI | ||
| 14:5025m Talk | Can LLMs replace Human Evaluators? An Empirical Study of LLM-as-a-Judge in Software Engineering Tasks Research Papers Ruiqi Wang Harbin Institute of Technology, Shenzhen, Jiyu Guo Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Guodong Fan Shandong Agriculture and Engineering University, Chun Yong Chong Huawei, Xin Xia Zhejiang UniversityDOI Pre-print | ||
| 15:1515m Demonstration | Code2API: A Tool for Generating Reusable APIs from Stack Overflow Code Snippets Tool Demonstrations Yubo Mai Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Xing Hu Zhejiang University, Lingfeng Bao  Zhejiang University, Jingyuan Chen , JianLing Sun Zhejiang University | ||
| 16:00 - 17:15 | |||
| 16:0025m Talk | Program Feature-based Benchmarking for Fuzz Testing Research Papers Miao Miao The University of Texas at Dallas, Sriteja Kummita Fraunhofer Institute for Mechatronic Systems Design (Fraunhofer IEM), Eric Bodden Heinz Nixdorf Institute at Paderborn University; Fraunhofer IEM, Shiyi Wei University of Texas at DallasDOI | ||
| 16:2525m Talk | Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-based RAG Research Papers Zhiyu Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Longxing Li Institute of Information Engineering, Chinese Academy of Sciences, China, Ruigang Liang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of SciencesDOI | ||
| 16:5025m Talk | Structure-Aware, Diagnosis-Guided ECU Firmware Fuzzing Research Papers Qicai Chen Fudan University, China, Kun Hu School of Computer Science, Fudan University, Sichen Gong Fudan University, China, Bihuan Chen Fudan University, kevin kong Fudan University, Haowen Jiang Fudan University, China, Bingkun Sun Fudan University, You Lu Fudan University, Xin Peng Fudan UniversityDOI | ||
| 16:00 - 17:15 | |||
| 16:0025m Talk | DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code Research Papers Wai Kin Wong Hong Kong University of Science and Technology, Daoyuan Wu Hong Kong University of Science and Technology, Huaijin Wang Ohio State University, Li Zongjie Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen LabDOI | ||
| 16:2525m Talk | DataHook: An Efficient and Lightweight System Call Hooking Technique without Instruction Modification Research Papers Quan Hong Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, Jiaqi Li Institute of Information Engineering, Chinese Academy of Sciences, Wen Zhang China Unicom Online Information Technology CO.,Ltd, Lidong Zhai Institute of Information Engineering, Chinese Academy of SciencesDOI | ||
| 16:5025m Talk | Tracezip: Efficient Distributed Tracing via Trace Compression Research Papers Zhuangbin Chen Sun Yat-sen University, Junsong Pu Beijing University of Posts and Telecommunication, Zibin Zheng Sun Yat-sen UniversityDOI | ||
| 16:00 - 17:15 | Code Generation with LLMsResearch Papers at Cosmos 3C  Chair(s): Yutian Tang University of Glasgow, United Kingdom | ||
| 16:0025m Talk | OmniGIRL: A Multilingual and Multimodal Benchmark for GitHub Issue Resolution Research Papers Lianghong Guo Sun Yat-sen University, Wei Tao Independent Researcher, Runhan Jiang Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Xilin Liu Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies, Mingzhi Mao Sun Yat-sen University, Hongyu Zhang Chongqing University, Zibin Zheng Sun Yat-sen UniversityDOI | ||
| 16:2525m Talk | ConTested: Consistency-Aided Tested Code Generation with LLM Research Papers Jinhao Dong Peking University, Jun Sun Singapore Management University, Wenjie Zhang National University of Singapore, Jin Song Dong National University of Singapore, Dan Hao Peking UniversityDOI Pre-print | ||
| 16:5025m Talk | Causality-Aided Evaluation and Explanation of Large Language Model-based Code Generation Research Papers Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Li Zongjie Hong Kong University of Science and Technology, Zhaoyu Wang HKUST, Shuai Wang Hong Kong University of Science and TechnologyDOI | ||
| 19:00 - 22:00 | |||
| 19:003h Social Event | Banquet Plenary Events | ||
Fri 27 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
| 09:00 - 10:30 | |||
| 09:0090m Talk | An Analysis of Patch Plausibility and Correctness for Generate-and-validate Patch Generation Systems (ISSTA MIP Talk) Plenary Events Zichao Qi MIT, Fan Long University of Toronto, Sara Achour Stanford University, Martin C. Rinard Massachusetts Institute of Technology | ||
| 11:00 - 12:15 | |||
| 11:0025m Talk | Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Research Papers Lei Yu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Zhirong Huang Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Hang Yuan Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Shiqi Cheng Institute of Software, Chinese Academy of Sciences, China, Li Yang Institute of Software, Chinese Academy of Sciences, Fengjun Zhang Institute of Software, Chinese Academy of Sciences, China, Chenjie Shen Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Jiajia Ma Institute of Software, Chinese Academy of Sciences, China, Jingyuan Zhang Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Junyi Lu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Chun Zuo SinosoftDOI | ||
| 11:2525m Talk | Enhancing Smart Contract Security Analysis with Execution Property Graphs Research Papers Kaihua Qin Yale University, Zhe Ye UC Berkeley, Zhun Wang UC Berkeley, Weilin Li University College London, Liyi Zhou The University of Sydney, Chao Zhang Tsinghua University, Dawn Song UC Berkeley, Arthur Gervais Imperial College LondonDOI | ||
| 11:5025m Talk | The Incredible Shrinking Context... in a decompiler near you Research Papers Sifis Lagouvardos University of Athens, Yannis Bollanos Dedaub, Neville Grech Dedaub Limited, Yannis Smaragdakis University of AthensDOI Pre-print | ||
| 11:00 - 12:15 | |||
| 11:0025m Talk | Bridging the Gaps Between Graph Neural Networks and Data-Flow Analysis: The Closer, the Better Research Papers Qingchen Yu Zhejiang University, Xin Liu Lanzhou University, Qingguo Zhou Lanzhou University, Chunming Wu Zhejiang UniversityDOI | ||
| 11:2525m Talk | Clause2Inv: A Generate-Combine-Check Framework for Loop Invariant Inference Research Papers Weining Cao Nanjing University, China, Guangyuan Wu Nanjing University, China, Tangzhi Xu Nanjing University, China, Yuan Yao Nanjing University, Hengfeng Wei State Key Laboratory for Novel Software Technology, Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma Nanjing UniversityDOI | ||
| 11:5025m Talk | Incremental Verification of Concurrent Programs through Refinement Constraint Adaptation Research Papers Liangze Yin National University of Defense Technology, Yiwei Li , Kun Chen National University of Defense Technology, Wei Dong National University of Defense Technology, Ji Wang National University of Defense TechnologyDOI | ||
| 11:00 - 12:15 | |||
| 11:0025m Talk | KEENHash: Hashing Programs into Function-aware Embeddings for Large-scale Binary Code Similarity Analysis Research Papers Zhijie Liu ShanghaiTech University, China, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen Lab, Liangfeng Zhang School of Information Science and Technology, ShanghaiTech University, Yutian Tang University of Glasgow, United KingdomDOI | ||
| 11:2525m Talk | Porting Software Libraries to OpenHarmony: Transitioning from TypeScript or JavaScript to ArkTS Research Papers Bo Zhou Northeastern University, Jiaqi Shi Northeastern University, Ying Wang Northeastern University, Li Li Beihang University, Li Tsz On The Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, ChinaDOI | ||
| 11:5025m Talk | STRUT: Structured Seed Case Guided Unit Test Generation for C Programs using LLMs Research Papers Jinwei Liu Xidian University, Chao Li Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Rui Chen Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Shaofeng Li Xidian University, Bin Gu Beijing Institute of Control Engineering, Mengfei Yang China Academy of Space TechnologyDOI | ||
| 11:00 - 12:05 | Empirical StudiesTool Demonstrations / Research Papers at Cosmos Hall  Chair(s): Miryung Kim UCLA and Amazon Web Services | ||
| 11:0025m Talk | Fixing Outside the Box: Uncovering Tactics for Open-Source Security Issue Management Research Papers Lyuye Zhang Nanyang Technological University, Wu Jiahui , Chengwei Liu Nanyang Technological University, Kaixuan Li Nanyang Technological University, Xiaoyu Sun Australian National University, Australia, Lida Zhao Nanyang Technological University, Chong Wang Nanyang Technological University, Yang Liu Nanyang Technological UniversityDOI | ||
| 11:2525m Talk | More Effective JavaScript Breaking Change Detection via Dynamic Object Relation Graph Research Papers Dezhen Kong Zhejiang University, Jiakun Liu Singapore Management University, Chao Ni Zhejiang University, David Lo Singapore Management University, Lingfeng Bao  Zhejiang UniversityDOI | ||
| 11:5015m Demonstration | LiPSBOMaker: A Prototype of Multi-Stage Linux Distribution Package SBOM Generator Tool Demonstrations Tong Qiu , Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
| 12:30 - 14:00 | |||
| 12:3090m Lunch | Lunch Catering | ||
| 12:30 - 14:00 | |||
| 12:3090m Talk | ISSTA Steering Commitee Meeting Meetings | ||
| 14:00 - 15:30 | AI TestingResearch Papers / Tool Demonstrations at Cosmos 3A  Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
| 14:0025m Talk | AudioTest: Prioritizing Audio Test Cases Research Papers Yinghua Li University of Luxembourg, Xueqi Dang University of Luxembourg, SnT, Wendkuuni Arzouma Marc Christian OUEDRAOGO University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of LuxembourgDOI Media Attached | ||
| 14:2525m Talk | S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models Research Papers Xiaohan Yuan Zhejiang University, Jinfeng Li Alibaba Group, Dongxia Wang Zhejiang University, Yuefeng Chen Alibaba Group, Xiaofeng Mao Alibaba Group, Longtao Huang Alibaba Group, Jialuo Chen Zhejiang University, Hui Xue Alibaba Group, Xiaoxia Liu Zhejiang University, Wenhai Wang Zhejiang University, Kui Ren Zhejiang University, Jingyi Wang Zhejiang UniversityDOI | ||
| 14:5025m Talk | Improving Deep Learning Framework Testing with Model-Level Metamorphic Testing Research Papers Yanzhou Mu , Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Xiang Chen Nantong University, Zhixiang Cao Xi'an Jiaotong University, Peiran Yang Nanjing University, Kexin Zhao Nanjing University, An Guo Nanjing University, Zhenyu Chen Nanjing UniversityDOI | ||
| 15:1515m Demonstration | ASTRAL: A Tool for the Automated Safety Testing of Large Language Models Tool Demonstrations Miriam Ugarte Mondragon University, Pablo Valle Mondragon University, José Antonio Parejo Maestre Universidad de Sevilla, Sergio Segura SCORE Lab, I3US Institute, Universidad de Sevilla, Seville, Spain, Aitor Arrieta Mondragon University | ||
| 14:00 - 15:30 | Binary Code Analysis and OptimizationResearch Papers / Tool Demonstrations at Cosmos 3B  Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
| 14:0025m Talk | BinQuery: A Novel Framework for Natural Language-Based Binary Code Retrieval Research Papers Bolun Zhang Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China, Zeyu Gao Tsinghua University, Hao Wang Tsinghua University, Yuxin Cui Institute for Network Sciences and Cyberspace, Tsinghua University, Siliang Qin Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China, Chao Zhang Tsinghua University, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Beibei Zhao Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, ChinaDOI | ||
| 14:2525m Talk | Wemby’s Web: Hunting for Memory Corruption in WebAssembly Research Papers Oussama Draissi University of Duisburg-Essen, Tobias Cloosters University of Duisburg-Essen, David Klein TU Braunschweig, Michael Rodler Amazon Web Services, Marius Musch TU Braunschweig, Martin Johns TU Braunschweig, Lucas Davi University of Duisburg-EssenDOI | ||
| 14:5025m Talk | Doctor: Optimizing Container Rebuild Efficiency by Instruction Re-Orchestration Research Papers Zhiling Zhu Zhejiang University of Technology, Tieming Chen Zhejiang University of Technology, Chengwei Liu Nanyang Technological University, Han Liu The Hong Kong University of Science and Technology, Qijie Song Zhejiang University of Technology, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Yang Liu Nanyang Technological UniversityDOI | ||
| 15:1515m Demonstration | ReGraph: A Tool for Binary Similarity Identification Tool Demonstrations | ||
| 14:00 - 15:30 | Gamification, Specifications, and Code ReviewsResearch Papers / Tool Demonstrations at Cosmos 3C  Chair(s): Michael Pradel University of Stuttgart | ||
| 14:0025m Talk | NADA: Neural Acceptance-driven Approximate Specification Mining Research Papers Weilin Luo Sun Yat-sen University, Tingchen Han Sun Yat-Sen University, Junming Qiu Sun Yat-sen University, Hai Wan Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Bo Peng Sun Yat-Sen University, Guohui Xiao Southeast University, Yanan Liu SUN YAT-SEN UNIVERSITYDOI | ||
| 14:2525m Talk | Gamifying Testing in IntelliJ: A Replicability Study Research Papers Philipp Straubinger CQSE GmbH, Tommaso Fulcini Politecnico di Torino, Giacomo Garaccione Politecnico di Torino, Luca Ardito Politecnico di Torino, Gordon Fraser University of PassauDOI | ||
| 14:5025m Talk | DeCoMa: Detecting and Purifying Code Dataset Watermarks through Dual Channel Code Abstraction Research Papers Yuan Xiao Nanjing University, Yuchen Chen Nanjing University, Shiqing Ma University of Massachusetts at Amherst, Haocheng Huang Soochow University, Chunrong Fang Nanjing University, Yanwei Chen Nanjing University, Weisong Sun Nanyang Technological University, Yunfeng Zhu Nanjing University, Xiaofang Zhang Soochow University, Zhenyu Chen Nanjing UniversityDOI Pre-print | ||
| 15:1515m Demonstration | Teaching Software Testing and Debugging with the Serious Game Sojourner under Sabotage Tool Demonstrations | ||
| 16:00 - 17:15 | Smart Contracts 2Research Papers at Cosmos 3B  Chair(s): Zhenbang Chen College of Computer, National University of Defense Technology | ||
| 16:0025m Talk | OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum Virtual Machine Research Papers Jie Ma Beihang University; Zhongguancun Laboratory, Ningyu He Hong Kong Polytechnic University, Jinwen Xi , Mingzhe Xing Zhongguancun Laboratory, Haoyu Wang Huazhong University of Science and Technology, Ying Gao School of Cyber Science and Technology, Beihang University; Zhongguancun Laboratory, Yinliang Yue Zhongguancun LaboratoryDOI | ||
| 16:2525m Talk | Why Does My Transaction Fail? A First Look at Failed Transactions on the Solana Blockchain Research Papers Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, David Lo Singapore Management University, Difan Xie Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Xiaohu Yang Zhejiang UniversityDOI | ||
| 16:5025m Talk | Automated Attack Synthesis for Constant Product Market Makers Research PapersDOI Pre-print | ||
| 16:00 - 17:30 | Fuzzing and Search-Based TestingResearch Papers / Tool Demonstrations at Cosmos 3C  Chair(s): Thuan Pham University of Melbourne | ||
| 16:0025m Talk | ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference Research Papers Yuchong Xie Hong Kong University of Science and Technology, Wenhui Zhang Hunan University, Changsha, China, Dongdong She HKUST (The Hong Kong University of Science and Technology)DOI | ||
| 16:2525m Talk | WildSync: Automated Fuzzing Harness Synthesis via Wild API Usage Recovery Research PapersDOI | ||
| 16:5025m Talk | FANDANGO: Evolving Language-Based Testing Research Papers José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, Marius Smytzek CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information SecurityLink to publication DOI | ||
| 17:1515m Demonstration | XAVIER: Grammar-Based Testing for XML Injection Attacks Tool Demonstrations Paul Kalbitzer , José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security | ||
| 17:30 - 17:45 | |||
| 17:3015m Day closing | Closing Session for ISSTA 25 Plenary Events Mike Papadakis University of Luxembourg | ||
| 19:00 - 19:45 | |||
| 19:0045m Social Event | Organ Concert Plenary Events | ||
Sat 28 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
| 09:00 - 18:00 | CPAchecker WorkshopWorkshops at Cosmos 3A  For the CPAchecker workshop program, please refer to the workshop website directly: https://cpa.sosy-lab.org/2025/. | ||
| 09:00 - 10:30 | Trustworthy AI for CodeEXPRESS at Cosmos 3B  Chair(s): Peng Di Ant Group & UNSW Sydney, Puzhuo Liu Ant Group & Tsinghua University | ||
| 09:0010m Day opening | Opening and Welcome EXPRESS | ||
| 09:1060m Keynote | Human-like AI Auditor for Code Repositories EXPRESS Xiangyu Zhang Purdue University | ||
| 10:1020m Talk | FuseApplyBench: Multilingual Benchmark for Trustworthy Code Edit Applying Task EXPRESS Ming Liang Ant Group, Qingyu Zhang the University of Hong Kong, Zhipeng Zuo Ant Group, Shaoqiang Zheng Ant Group, Dajun Chen Ant Group, Wei Jiang Ant Group, Yong Li Ant Group | ||
| 09:00 - 10:30 | |||
| 09:0010m Day opening | Welcome FUZZING | ||
| 09:1050m Keynote | Keynote: Constraining Fuzzing without Paying Too Much FUZZING Miryung Kim UCLA and Amazon Web Services | ||
| 10:0010m Talk | Personalized Fuzzing: A Case Study with the FANDANGO Fuzzer on a GNSS Module FUZZING Stephan Neuhaus ZHAW School of Engineering, José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security | ||
| 10:1010m Talk | Hybrid Fuzzing of Infrastructure as Code Programs FUZZING Emilio Coppa LUISS University, Daniel Sokolowski University of St. Gallen, Guido Salvaneschi University of St. Gallen | ||
| 10:2010m Talk | Towards Fuzzing Zero-Knowledge Proof Circuits FUZZING Stefanos Chaliasos Imperial College London, Imam Al-Fath ZKSecurity, Alastair F. Donaldson Imperial College London | ||
| 09:00 - 18:00 | LLMSC WorkshopWorkshops at Cosmos 3D  For the LLMSC workshop program, please refer to the workshop website directly: https://llmsc.github.io/. | ||
| 11:00 - 12:30 | Intelligence and PrivacyEXPRESS at Cosmos 3B  Chair(s): Peng Di Ant Group & UNSW Sydney, Puzhuo Liu Ant Group & Tsinghua University | ||
| 11:0020m Talk | Patch the Leak: Strengthening CodeLLMs Against Privacy Extraction Threats EXPRESS Yongjian Guo Tsinghua University & Ant Group, Wanlun Ma Swinburne University of Technology, Xi Xiao Tsinghua University, Sheng Wen Swinburne University of Technology, Peng Di Ant Group & UNSW Sydney, Xiaogang Zhu The University of Adelaide | ||
| 11:2020m Talk | From Large Language Models to Adversarial Malware: How far are we EXPRESS Shuai He Huazhong University of Science and Technology, Hao Yan Huazhong University of Science and Technology, Wenke Li Huazhong University of Science and Technology, Sheng Hong Huazhong University of Science and Technology, Xiaowei Guo Huazhong University of Science and Technology, Xiaofan Liu Huazhong University of Science and Technology, Cai Fu Huazhong University of Science and Technology | ||
| 11:4020m Talk | Towards Source Mapping for Zero-Knowledge Smart Contracts: Design and Preliminary Evaluation EXPRESS Pei Xu University of Technology Sydney, Yulei Sui University of New South Wales, Mark Staples Digital Finance CRC | ||
| 12:0020m Talk | TestFlow: Advancing Mobile UI Testing through Multi-Step Reinforcement Learning EXPRESS Xiaoxuan Tang Ant Group, Xinfang Chen Ant Group, Dajun Chen Ant Group, Sheng Zhou Zhejiang University, Wei Jiang Ant Group, Yong Li Ant Group | ||
| 12:2010m Day closing | Discussion and Conclusion EXPRESS | ||
| 11:00 - 13:00 | |||
| 11:0050m Keynote | Keynote: Are you sure you belong in academia? FUZZING | ||
| 12:0060m Panel | Panel Discussion: Fuzzing in Research vs. Industry FUZZING | ||
| 16:00 - 16:10 | |||
| 16:0010m Day closing | Concluding Remarks FUZZING | ||