ISSTA/ECOOP 2024 Program
Mon 16 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:00 - 08:30 | |||
08:30 - 09:00 | |||
08:30 30mDay opening | Opening and Welcome ECOOP Technical Papers Werner Dietl University of Waterloo, Jonathan Aldrich Carnegie Mellon University, Guido Salvaneschi University of St. Gallen |
09:00 - 10:00 | |||
09:00 60mKeynote | Optimizing the Object-Relational Interface ECOOP Technical Papers Alvin Cheung University of California at Berkeley |
09:00 - 10:00 | |||
09:00 15mDay opening | Opening and Welcome FUZZING | ||
09:15 45mKeynote | [Keynote] Reasons for the Unreasonable Success of Fuzzing FUZZING |
10:00 - 10:30 | |||
10:30 - 12:00 | |||
10:30 10mDay opening | Opening remarks PLAID Alceste Scalas Technical University of Denmark | ||
10:40 50mKeynote | Runtime Instrumentation for Reactive Components PLAID Duncan Paul Attard University of Glasgow | ||
11:30 30mTalk | CAUSALDOT: Causally Consistent Transactions with Non-blocking Reads and Deterministic Ordering PLAID Ruijie Gong The University of Hong Kong, Hong Kong, Haoze Song The University of Hong Kong, Hong Kong, Heming Cui University of Hong Kong |
10:30 - 12:00 | |||
10:30 15mTalk | Static Basic Block Versioning ECOOP Technical Papers Manuel Serrano Inria; Université Côte d’Azur, Olivier Melançon DIRO, Université de Montréal, Marc Feeley Université de Montréal | ||
10:45 15mTalk | Cross Module Quickening - The Curious Case of C Extensions ECOOP Technical Papers Felix Berlakovich μCSRL, CODE Research Institute, University of the Bundeswehr Munich, Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
11:00 15mTalk | Compiling with Arrays ECOOP Technical Papers David Richter Technical University of Darmstadt, Timon Böhler Technical University of Darmstadt, Pascal Weisenburger University of St. Gallen, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE Pre-print | ||
11:15 15mTalk | The Performance Effects of Virtual-Machine Instruction Pointer Updates ECOOP Technical Papers | ||
11:30 15mTalk | Taking a Closer Look: An Outlier-Driven Approach to Compilation-Time Optimization ECOOP Technical Papers Florian Huemer JKU Linz, David Leopoldseder Oracle Labs, Aleksandar Prokopec Oracle Labs, Raphael Mosaner JKU Linz, Hanspeter Mössenböck JKU Linz | ||
11:45 15mTalk | Optimizing Layout of Recursive Datatypes with Marmoset ECOOP Technical Papers Vidush Singhal Purdue University, Chaitanya S. Koparkar Indiana University, Joseph Zullo Purdue University, Artem Pelenitsyn Purdue University, Michael Vollmer University of Kent, Mike Rainey Carnegie Mellon University, Ryan R. Newton Purdue University, Milind Kulkarni Purdue University DOI Pre-print |
10:30 - 12:00 | |||
10:30 15mTalk | Directed or Undirected: Investigating Fuzzing Strategies in a CI/CD Setup FUZZING | ||
10:45 15mTalk | Effective Fuzzing within CI/CD Pipelines FUZZING Arindam Sharma Imperial College London, UK, Cristian Cadar Imperial College London, Jonathan Metzman Google | ||
11:00 15mTalk | Automated Feature Testing of Verilog Parsers using Fuzzing FUZZING Quentin Corradi Imperial College London, John Wickerson Imperial College London, George A. Constantinides Imperial College London, UK | ||
11:15 15mTalk | WebAssembly as a Fuzzing Compilation Target FUZZING Florian Bauckholt CISPA Helmholtz Center for Information Security, Thorsten Holz CISPA Helmholtz Center for Information Security | ||
11:30 15mTalk | Visualization Task Taxonomy to Understand the Fuzzing Internals FUZZING Sriteja Kummita Fraunhofer IEM, Miao Miao The University of Texas at Dallas, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Shiyi Wei University of Texas at Dallas |
12:00 - 13:30 | |||
13:30 - 15:00 | |||
13:30 30mTalk | Local Projections of DCR Choreographies with Data and Spawn PLAID Eduardo Geraldo , Bruno Braga NOVA University Lisbon, Nuno Fernandes NOVA University Lisbon, Diogo Ye NOVA University Lisbon, João Costa Seco NOVA-LINCS; Nova University of Lisbon | ||
14:00 30mTalk | Compositional Verification of Swarm Protocols PLAID Florian Furbach Technical University of Denmark, Alceste Scalas Technical University of Denmark, Roland Kuhn Actyx AG, Emilio Tuosto Gran Sasso Science Institute, L'Aquila, Italy | ||
14:30 30mTalk | Library Based Choreographies in Lean PLAID Simon Daniel TU Darmstadt, David Richter Technical University of Darmstadt, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE |
13:30 - 15:00 | Types 1ECOOP Technical Papers at EI 7 Chair(s): Emilio Tuosto Gran Sasso Science Institute, L'Aquila, Italy | ||
13:30 15mTalk | Behavioral up/down casting for statically typed languages ECOOP Technical Papers Lorenzo Bacchiani University of Bologna, Mario Bravetti Università di Bologna, Marco GIUNTI University of Oxford, João Mota NOVA School of Science and Technology, António Ravara Nova University of Lisbon | ||
13:45 15mTalk | Regrading Policies for Flexible Information Flow Control in Session-Typed Concurrency ECOOP Technical Papers Farzaneh Derakhshan Illinois Institute of Technology, Stephanie Balzer Carnegie Mellon University, Yue Yao Carnegie Mellon University | ||
14:00 15mTalk | Ozone: Fully Out-of-Order Choreographies ECOOP Technical Papers Dan Plyukhin University of Southern Denmark, Marco Peressotti University of Southern Denmark, Fabrizio Montesi University of Southern Denmark Pre-print | ||
14:15 15mTalk | Information Flow Control in Cyclic Process Networks ECOOP Technical Papers Bas van den Heuvel Karlsruhe University of Applied Sciences, University of Freiburg, Farzaneh Derakhshan Illinois Institute of Technology, Stephanie Balzer Carnegie Mellon University | ||
14:30 15mTalk | Formalizing, Mechanizing, and Verifying Class-based Refinement Types ECOOP Technical Papers Ke Sun Peking University, Di Wang Peking University, Sheng Chen UL Lafayette, Meng Wang University of Bristol, Dan Hao Peking University | ||
14:45 15mTalk | Pure methods for roDOT ECOOP Technical Papers Vlastimil Dort Charles University, Yufeng Li University of Waterloo, Ondřej Lhoták University of Waterloo, Pavel Parizek Charles University |
13:30 - 15:00 | |||
13:30 45mKeynote | [Keynote] Is "AI" useful for fuzzing? FUZZING | ||
14:15 45mLive Q&A | Discussion: LLMs and Fuzzing for Bug Finding FUZZING |
15:00 - 15:30 | |||
15:30 - 17:00 | |||
15:30 30mTalk | Modal Crash Types for Intermittent Computing PLAID Myra Dotzel Carnegie Mellon University, Farzaneh Derakhshan Illinois Institute of Technology, Milijana Surbatovich University of Maryland, Limin Jia Carnegie Mellon University | ||
16:00 30mTalk | Less is More Revisited: Global Specification and Local Verification Approaches PLAID Nobuko Yoshida University of Oxford, UK, Ping Hou University of Oxford, Iona Kuhn University of Oxford | ||
16:30 30mTalk | Fair Join Pattern Matching for Actors PLAID Philipp Haller KTH Royal Institute of Technology, Ayman Hussein Technical University of Denmark, Hernan Melgratti University of Buenos Aires, Argentina, Alceste Scalas Technical University of Denmark, Emilio Tuosto Gran Sasso Science Institute, L'Aquila, Italy DOI |
15:30 - 17:00 | |||
15:30 15mTalk | Partial Redundancy Elimination in Two Iterative Data Flow Analyses ECOOP Technical Papers Reshma Roy National Institute of Technology, Calicut, Sreekala S National Institute of Technology, Calicut, Vineeth Paleri National Institute of Technology, Calicut | ||
15:45 15mTalk | Indirection-Bounded Call Graph Analysis ECOOP Technical Papers Madhurima Chakraborty University of California, Riverside, Aakash Gnanakumar University of California, Riverside, Manu Sridharan University of California at Riverside, Anders Møller Aarhus University | ||
16:00 15mTalk | Dynamically Generating Callback Summaries for Enhancing Static Analysis ECOOP Technical Papers Steven Arzt Fraunhofer SIT; ATHENE, Marc Miltenberger Fraunhofer SIT | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Julius Näumann TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt | ||
16:15 15mTalk | A CFL-Reachability Formulation of Callsite-Sensitive Pointer Analysis with Built-in On-the-Fly Call Graph Construction ECOOP Technical Papers Dongjie He Chongqing University, China, Jingbo Lu University of New South Wales, Jingling Xue UNSW Sydney | ||
16:30 15mTalk | Scaling Interprocedural Static Data-Flow Analysis to Large C/C++ Applications ECOOP Technical Papers Fabian Schiebel Fraunhofer IEM, Florian Sattler Saarland Informatics Campus, Saarland University, Philipp Dominik Schubert Heinz Nixdorf Institut, Paderborn University, Sven Apel Saarland University, Eric Bodden |
15:30 - 17:00 | |||
15:30 15mTalk | Sparse Symbolic Loop Execution FUZZING Frank Busse Imperial College London, Martin Nowack Imperial College London, Cristian Cadar Imperial College London | ||
15:45 15mTalk | LOOL: Low-Overhead, Optimization-Log-Guided Compiler Fuzzing FUZZING Florian Schwarcz Johannes Kepler University Linz, Felix Berlakovich μCSRL, CODE Research Institute, University of the Bundeswehr Munich, Gergö Barany Oracle Labs, Hanspeter Mössenböck JKU Linz | ||
16:00 15mTalk | The Havoc Paradox in Generator-Based Fuzzing FUZZING Ao Li Carnegie Mellon University, Madonna Huang University of British Columbia, Caroline Lemieux University of British Columbia, Rohan Padhye Carnegie Mellon University | ||
16:15 15mTalk | Understanding and Improving Coverage Tracking with AFL++ FUZZING Vasil Sarafov μCSRL, CODE Research Institute, University of the Bundeswehr Munich, David Markvica μCSRL, CODE Research Institute, University of the Bundeswehr Munich, Felix Berlakovich μCSRL, CODE Research Institute, University of the Bundeswehr Munich, Matthias Bernad μCSRL, CODE Research Institute, University of the Bundeswehr Munich, Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
16:30 30mDay closing | Concluding Remarks FUZZING |
17:00 - 19:00 | |||
Tue 17 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 09:00 | |||
08:45 - 09:00 | Welcome to the Doctoral SymposiumDoctoral Symposium at EI 2 Pichelmayer Chair(s): Alessandra Gorla IMDEA Software Institute, Burcu Kulahcioglu Ozkan Delft University of Technology | ||
08:50 - 10:00 | MET2024 Opening and Keynote TalkMET at EI 9 Hlawka Chair(s): Huai Liu Swinburne University of Technology | ||
08:50 10mDay opening | Opening remarks MET Huai Liu Swinburne University of Technology | ||
09:00 60mKeynote | Keynote speech: AI-Driven Metamorphic Testing for Autonomous Systems MET Arnaud Gotlieb Simula Research Laboratory |
09:00 - 10:00 | |||
09:00 60mKeynote | The Devil's Guide to Doing your PhD – 10 tips for despair, dismay, and disappointment Doctoral Symposium Andreas Zeller CISPA Helmholtz Center for Information Security Link to publication |
09:00 - 10:00 | |||
09:00 60mKeynote | Dahl-Nygaard Senior Prize Keynote - Rachid Guerraoui ECOOP Technical Papers Rachid Guerraoui EPFL |
10:00 - 10:30 | |||
10:30 - 12:00 | |||
10:30 15mPanel | Introduction to the Gamify 2024 workshop Gamify Riccardo Coppola Politecnico di Torino, Luca Ardito Politecnico di Torino, Maurizio Leotta DIBRIS, University of Genova, Italy, Gordon Fraser University of Passau | ||
10:45 45mKeynote | Bug-Hunting Games to Assist Software Development and Testing Education Gamify | ||
11:30 30mPaper | ScoutDroid: A Tool For Mobile Augmented Testing With Live Feedback Gamify A: Lorenzo Laudadio , A: Riccardo Coppola Politecnico di Torino, A: Marco Torchiano Politecnico di Torino, A: Stevan Tomic |
10:30 - 12:00 | |||
10:30 15mTalk | Soft Verification for Actor Contract Systems Doctoral Symposium S: Bram Vandenbogaerde Vrije Universiteit Brussel, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
10:45 10mTalk | Integrating Mutation Techniques to Keep Specification and Source Code in Sync Doctoral Symposium S: Kerstin Jacob University of Bamberg, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
10:55 10mTalk | Leveraging Natural Language Processing and Data Mining to Augment and Validate APIs Doctoral Symposium S: Alix Decrop University of Namur, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
11:05 15mTalk | From Fault Injection to Formal Verification: A Holistic Approach to Fault Diagnosis in Cyber-Physical Systems Doctoral Symposium S: Drishti Yadav Technische Universität Wien, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
11:20 15mTalk | Robustness against the C/C++11 memory model Doctoral Symposium S: Roy Margalit Tel Aviv University, Israel, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
11:35 10mTalk | Automated Testing of Networked Systems Reliability Doctoral Symposium S: Michal Rozsíval Faculty of Information Technology, Brno University of Technology, P: Andreas Zeller CISPA Helmholtz Center for Information Security, P: Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
11:45 10mTalk | Search-Based Translations for Tensor Operations Doctoral Symposium Link to publication |
10:30 - 12:00 | |||
10:30 15mTalk | Defining Name Accessibility using Scope Graphs ECOOP Technical Papers Link to publication Pre-print | ||
10:45 15mTalk | Rose: Composable Autodiff for the Interactive Web ECOOP Technical Papers Sam Estep Carnegie Mellon University, Wode Ni Carnegie Mellon University, Raven Rothkopf Barnard College, Joshua Sunshine Carnegie Mellon University | ||
11:00 15mTalk | Failure Transparency in Stateful Dataflow Systems ECOOP Technical Papers Aleksey Veresov KTH Royal Institute of Technology, Jonas Spenger KTH Royal Institute of Technology, Paris Carbone KTH Royal Institute of Technology, Philipp Haller KTH Royal Institute of Technology DOI Pre-print Media Attached File Attached | ||
11:15 15mTalk | Fair join pattern matching for actors ECOOP Technical Papers Philipp Haller KTH Royal Institute of Technology, Ayman Hussein Technical University of Denmark, Hernan Melgratti University of Buenos Aires, Argentina, Alceste Scalas Technical University of Denmark, Emilio Tuosto Gran Sasso Science Institute, L'Aquila, Italy DOI | ||
11:30 15mTalk | Constrictor: Immutability as a Design Concept ECOOP Technical Papers DOI Pre-print | ||
11:45 15mTalk | A Language-Based Version Control System for Python ECOOP Technical Papers Luís Carvalho NOVA School of Science and Technology, João Costa Seco NOVA-LINCS; Nova University of Lisbon |
10:30 - 12:00 | MET2024 Session 1: Applications of Metamorphic TestingMET at EI 9 Hlawka Chair(s): Kun Qiu Hefei University of Technology | ||
10:30 30mPaper | Metamorphic Testing of a Steer-by-Wire System: An Intercultural Students-as-Partners Collaboration Experience MET Yifan Zhang University of Nottingham Ningbo China, Dave Towey University of Nottingham Ningbo China, Matthew pike University of Nottingham, Ningbo, China, Rui Qiu , Axel Tan Jaya , Sze Huey , Xinyi Zhang , Yuan Wu | ||
11:00 30mPaper | Metamorphic Testing of Image Processing Applications: A General Framework and Optimization Strategies MET Chang-ai Sun University of Science and Technology Beijing, Jiayu Xing , Xiaobei Li , Xiao-Yi Zhang University of Science and Technology Beijing, An Fu University of Science and Technology Beijing | ||
11:30 30mPaper | Evaluating Human Trajectory Prediction with Metamorphic Testing MET Helge Spieker Simula Research Laboratory, Nassim Belmecheri , Arnaud Gotlieb Simula Research Laboratory, Nadjib Lazaar Pre-print |
12:00 - 13:30 | |||
13:30 - 15:00 | Gamify 2024 session 2Gamify at EI 10 Fritz Paschke Chair(s): Maurizio Leotta DIBRIS, University of Genova, Italy | ||
13:30 30mPaper | Test Smells Learning by a Gamification Approach Gamify A: Anna Rita Fasolino Federico II University of Naples, A: Porfirio Tramontana Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Italy | ||
14:00 30mPaper | Enlisting Students in Gamifying Software Testing Education: Results and Key Insights Gamify | ||
14:30 30mPaper | Engaging Developers in Exploratory Unit Testing through Gamification Gamify |
13:30 - 15:00 | |||
13:30 15mTalk | Shaping Test Inputs in Grammar-Based Fuzzing Doctoral Symposium S: José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, P: Elisa Gonzalez Boix Vrije Universiteit Brussel, P: Marcelo d'Amorim North Carolina State University, P: Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE | ||
13:45 10mTalk | Graph Learning for Extract Class Refactoring Doctoral Symposium S: Luqiao Wang Xidian University, P: Elisa Gonzalez Boix Vrije Universiteit Brussel, P: Marcelo d'Amorim North Carolina State University, P: Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE | ||
13:55 10mTalk | With Biabduction towards Memory Safety across the Rust-C-FFI Doctoral Symposium S: Florian Sextl TU Wien, Austria, P: Elisa Gonzalez Boix Vrije Universiteit Brussel, P: Marcelo d'Amorim North Carolina State University, P: Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE | ||
14:05 10mTalk | Decentralized Near-Synchronous Local-First Programming Collaboration Doctoral Symposium S: Leon Freudenthaler FH Campus Wien, P: Elisa Gonzalez Boix Vrije Universiteit Brussel, P: Marcelo d'Amorim North Carolina State University, P: Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE | ||
14:15 10mTalk | Quality Assurance For Non-Trivial Systems: Use Case GCC Plugins Doctoral Symposium S: Nimantha Kariyakarawana DistriNet-KU Leuven, P: Elisa Gonzalez Boix Vrije Universiteit Brussel, P: Marcelo d'Amorim North Carolina State University, P: Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE | ||
14:25 10mTalk | Collaboration to Repository-Level Vulnerability Detection Doctoral Symposium S: Xin-Cheng Wen Harbin Institute of Technology, P: Elisa Gonzalez Boix Vrije Universiteit Brussel, P: Marcelo d'Amorim North Carolina State University, P: Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE | ||
14:35 15mTalk | Learning the Effects of Software Changes Doctoral Symposium S: Laura Plein CISPA Helmholtz Center for Information Security, P: Elisa Gonzalez Boix Vrije Universiteit Brussel, P: Marcelo d'Amorim North Carolina State University, P: Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE |
13:30 - 15:00 | ECOOP Technical Papers at EI 7 Chair(s): Jonathan Aldrich Carnegie Mellon University, Guido Salvaneschi University of St. Gallen | ||
13:30 30mAwards | ECOOP Awards ECOOP Technical Papers | ||
14:00 15mTalk | Mutation-based Lifted Repair of Software Product Lines ECOOP Technical Papers Aleksandar S. Dimovski Mother Teresa University, Skopje | ||
14:15 15mTalk | Refinements for Multiparty Message-Passing Protocols: Specification-agnostic theory and implementation ECOOP Technical Papers | ||
14:30 15mTalk | CtChecker: a Precise, Sound and Efficient Static Analysis for Constant-Time Programming ECOOP Technical Papers | ||
14:45 15mTalk | The Fault in our Stars: Designing Reproducible Large-scale Code Analysis Experiments ECOOP Technical Papers Petr Maj Czech Technical University, Stefanie Muroya Lei Institute of Science and Technology in Austria, Konrad Siek Czech Technical University in Prague, Luca Di Grazia University of Stuttgart, Jan Vitek Northeastern University |
13:30 - 15:00 | MET2024 Session 2: Future Research of MTMET at EI 9 Hlawka Chair(s): Aitor Arrieta Mondragon University | ||
13:30 30mPaper | Using Category Partition to Detect Metamorphic Relations MET | ||
14:00 60mPanel | Interactive discussion: Key areas for MT’s research MET |
15:00 - 15:30 | |||
15:30 - 17:00 | |||
15:30 30mPaper | Testing Robot Challenge: a Serious Game for Testing Learning Gamify A: Anna Rita Fasolino Federico II University of Naples, A: Caterina Maria Accetto , A: Porfirio Tramontana University of Naples Federico II | ||
16:00 30mPaper | A Gaming Quest to Improve Web Locators Robustness Gamify A: Diego Clerissi DIBRIS, University of Genova, Italy, A: Maurizio Leotta DIBRIS, University of Genova, Italy, A: Filippo Ricca DIBRIS, University of Genova, Italy | ||
16:30 30mTalk | Panel: upcoming challenges for Gamification in Software Engineering Gamify |
15:30 - 17:00 | |||
15:30 90mKeynote | How to get your Ph.D. DONE! Doctoral Symposium Eric Jul University of Oslo |
15:30 - 17:00 | |||
15:30 15mTalk | InferType: A Compiler Toolkit for Implementing Efficient Constraint-Based Type Inference ECOOP Technical Papers Senxi Li The University of Tokyo, Tetsuro Yamazaki University of Tokyo, Shigeru Chiba University of Tokyo | ||
15:45 15mTalk | A Sound Type System for Secure Currency Flow ECOOP Technical Papers Luca Aceto Reykjavik University, Daniele Gorla Department of Computer Science, Sapienza University of Rome, Stian Lybech Reykjavik University | ||
16:00 15mTalk | Type Tailoring ECOOP Technical Papers Ashton Wiersdorf University of Utah, Stephen Chang University of Massachusetts Boston, Matthias Felleisen Northeastern University, Ben Greenman University of Utah | ||
16:15 15mTalk | Learning Gradual Typing Performance ECOOP Technical Papers Mohammad Wahiduzzaman Khan UL Lafayette, Sheng Chen University of Louisiana at Lafayette, Yi He Old Dominion University | ||
16:30 15mTalk | Generalizing Shape Analysis with Gradual Types ECOOP Technical Papers Zeina Migeed University of California, Los Angeles, James Reed Fireworks AI, Jason Ansel Meta, Jens Palsberg University of California, Los Angeles (UCLA) |
15:30 - 17:00 | |||
15:30 30mPaper | Using Metamorphic Relations to Improve Accuracy and Robustness of Deep Neural Networks MET Kun Qiu Hefei University of Technology, Yu Zhou , Pak-Lok Poon School of Engineering & Technology, Central Queensland University, Australia | ||
16:00 60mPanel | Panel discussion: MT4AI & AI4MT MET |
18:00 - 20:00 | |||
Wed 18 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:00 - 08:30 | |||
08:30 - 09:00 | Opening and AwardsISSTA Keynotes at EI 7 Chair(s): Maria Christakis TU Wien, Michael Pradel University of Stuttgart | ||
09:00 - 10:00 | |||
09:00 60mKeynote | Software Quality Assurance in the Era of Large Language Models ISSTA Keynotes |
09:00 - 10:00 | |||
09:00 60mKeynote | Software Quality Assurance in the Era of Large Language Models ECOOP Technical Papers Lingming Zhang University of Illinois at Urbana-Champaign |
10:00 - 10:30 | |||
10:30 - 11:50 | Code Mutation and ReductionISSTA Technical Papers at EI 10 Fritz Paschke Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
10:30 20mTalk | Large Language Models for Equivalent Mutant Detection: How Far Are We?ACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers Zhao Tian Tianjin University, Honglin Shu Kyushu University, Dong Wang Tianjin University, Xuejie Cao Tianjin University, Yasutaka Kamei Kyushu University, Junjie Chen Tianjin University DOI Pre-print | ||
10:50 20mTalk | An Empirical Examination of Fuzzer Mutator Performance ISSTA Technical Papers James Kukucka George Mason University, Luís Pina University of Illinois at Chicago, Paul Ammann George Mason University, Jonathan Bell Northeastern University DOI | ||
11:10 20mTalk | Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java Programs ISSTA Technical Papers Benjamin Kushigian University of Washington, Samuel Kaufman University of Washington, Ryan Featherman University of Washington, Hannah Potter University of Washington, Ardi Madadi University of Washington, René Just University of Washington DOI | ||
11:30 20mTalk | LPR: Large Language Models-Aided Program Reduction ISSTA Technical Papers Mengxiao Zhang University of Waterloo, Yongqiang Tian Hong Kong University of Science and Technology, Zhenyang Xu University of Waterloo, Yiwen Dong University of Waterloo, Shin Hwei Tan Concordia University, Chengnian Sun University of Waterloo DOI |
10:30 - 12:00 | Synthesis and verificationECOOP Technical Papers at EI 2 Pichelmayer Chair(s): Peter Thiemann University of Freiburg, Germany | ||
10:30 15mTalk | Inductive Predicate Synthesis Modulo Programs ECOOP Technical Papers Scott Wesley Dalhousie University, Maria Christakis TU Wien, Jorge A. Navas Certora, Richard Trefler University of Waterloo, Valentin Wüstholz ConsenSys, Arie Gurfinkel University of Waterloo | ||
10:45 15mTalk | Fearless Asynchronous Communications with Timed Multiparty Session Protocols ECOOP Technical Papers Ping Hou University of Oxford, Nicolas Lagaillardie Imperial College London, Nobuko Yoshida University of Oxford | ||
11:00 15mTalk | Java Bytecode Normalization for Code Similarity Analysis ECOOP Technical Papers Stefan Schott Heinz Nixdorf Institut, Paderborn University, Serena Elisa Ponta SAP Security Research, Wolfram Fischer SAP Security Research, Jonas Klauke Heinz Nixdorf Institut, Paderborn University, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM | ||
11:30 15mTalk | Higher-Order Specifications for Deductive Synthesis of Programs with Pointers ECOOP Technical Papers David Young University of Kansas, USA, Ziyi Yang National University of Singapore, Ilya Sergey National University of Singapore, Alex Potanin Australian National University | ||
11:45 15mTalk | Matching Plans for Frame Inference in Compositional Reasoning ECOOP Technical Papers Andreas Lööw Imperial College London, Daniele Nantes-Sobrinho Imperial College London, Sacha-Élie Ayoun Imperial College London, Petar Maksimović Imperial College London, UK, Philippa Gardner Imperial College London |
10:30 - 11:50 | |||
10:30 20mTalk | Toward the Automated Localization of Buggy Mobile App UIs from Bug Descriptions ISSTA Technical Papers Antu Saha William & Mary, Yang Song William & Mary, Junayed Mahmud University of Central Florida, Ying Zhou George Mason University, Kevin Moran University of Central Florida, Oscar Chaparro William & Mary DOI | ||
10:50 20mTalk | Reproducing Timing-Dependent GUI Flaky Tests in Android Apps via a Single Event Delay ISSTA Technical Papers Xiaobao Cai Fudan University, Zhen Dong Fudan University, Yongjiang Wang Fudan University, Abhishek Tiwari University of Passau, Xin Peng Fudan University DOI | ||
11:10 20mTalk | Semantic Constraint Inference for Web Form Test Generation ISSTA Technical Papers Parsa Alian University of British Columbia, Noor Nashid University of British Columbia, Mobina Shahbandeh University of British Columbia, Ali Mesbah University of British Columbia DOI | ||
11:30 20mTalk | Guardian: A Runtime Framework for LLM-Based UI Exploration ISSTA Technical Papers Dezhi Ran Peking University, Hao Wang Peking University, Zihe Song University of Texas at Dallas, Mengzhou Wu Peking University, Yuan Cao Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Tao Xie Peking University DOI |
10:30 - 11:50 | |||
10:30 15mTalk | Coroutines Scheduler CAKC Nikita Koval JetBrains | ||
10:45 40mTalk | Fast and Scalable Communication Channels CAKC Nikita Koval JetBrains Link to publication | ||
11:25 25mTalk | CQS: A Formally-Verified Framework for Fair and Abortable Synchronization Primitives CAKC Nikita Koval JetBrains Link to publication |
10:30 - 11:50 | |||
10:30 20mTalk | AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code GenerationACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Zhou Yang Singapore Management University, Li Li Beihang University, David Lo Singapore Management University DOI Pre-print | ||
10:50 20mTalk | When to Stop? Towards Efficient Code Generation in LLMs with Excess Token PreventionACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers Lianghong Guo Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Ensheng Shi Xi’an Jiaotong University, Wanjun Zhong Sun Yat-sen University, Hongyu Zhang Chongqing University, Jiachi Chen Sun Yat-sen University, Ruikai Zhang Huawei Cloud Computing Technologies, Yuchi Ma Huawei Cloud Computing Technologies, Zibin Zheng Sun Yat-sen University DOI | ||
11:10 20mTalk | FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion ISSTA Technical Papers Qi Guo Tianjin University, Xiaohong Li Tianjin University, Xiaofei Xie Singapore Management University, Shangqing Liu Nanyang Technological University, Ze Tang Nanjing University, Ruitao Feng Singapore Management University, Junjie Wang Tianjin University, Jidong Ge Nanjing University, Lei Bu Nanjing University DOI | ||
11:30 20mTalk | Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks ISSTA Technical Papers Yuxin Qiu University of California at Riverside, Jie Hu University of California at Riverside, Qian Zhang University of California at Riverside, Heng Yin University of California at Riverside DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Policy Testing with MDPFuzz (Replicability Study)ACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers Quentin Mazouni Simula Research Laboratory, Helge Spieker Simula Research Laboratory, Arnaud Gotlieb Simula Research Laboratory, Mathieu Acher University of Rennes - Inria - CNRS - IRISA DOI | ||
10:50 20mTalk | Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation ISSTA Technical Papers DOI | ||
11:10 20mTalk | Enhancing ROS System Fuzzing through Callback Tracing ISSTA Technical Papers Yuheng Shen Tsinghua University, Jianzhong Liu Tsinghua University, Yiru Xu Tsinghua University, Hao Sun ETH Zurich, Mingzhe Wang Tsinghua University, Nan Guan City University of Hong Kong, Heyuan Shi Central South University, Yu Jiang Tsinghua University DOI | ||
11:30 20mTalk | Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC ISSTA Technical Papers Haolai Wei Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Liwei Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhijie Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Gang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI |
12:00 - 13:30 | |||
12:00 - 13:30 | Diversity and Inclusion LunchSocial Events at EI 1 Petritsch https://conf.researchr.org/track/issta-ecoop-2024/issta-ecoop-2024-diversity | ||
13:30 - 14:50 | Domain-Specific TestingISSTA Technical Papers at EI 10 Fritz Paschke Chair(s): Marcelo d'Amorim North Carolina State University | ||
13:30 20mTalk | UPBEAT: Test Input Checks of Q# Quantum Libraries ISSTA Technical Papers Tianmin Hu Northwest University, Guixin Ye Northwest University, Zhanyong Tang Northwest University, Shin Hwei Tan Concordia University, Huanting Wang University of Leeds, Meng Li Hefei University of Technology, Zheng Wang University of Leeds DOI | ||
13:50 20mTalk | Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement ISSTA Technical Papers Gwihwan Go Tsinghua University, Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Xiazijian Zou Central South University, Heyuan Shi Central South University, Yu Jiang Tsinghua University DOI | ||
14:10 20mTalk | AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar InferenceACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers DOI | ||
14:30 20mTalk | Ma11y: A Mutation Framework for Web Accessibility Testing ISSTA Technical Papers Mahan Tafreshipour University of California at Irvine, Anmol Vilas Deshpande University of California at Irvine, Forough Mehralian University of California at Irvine, Iftekhar Ahmed University of California at Irvine, Sam Malek University of California at Irvine DOI |
13:30 - 15:00 | VerificationECOOP Technical Papers at EI 2 Pichelmayer Chair(s): João Costa Seco NOVA-LINCS; Nova University of Lisbon | ||
13:30 15mTalk | A Dynamic Logic for Symbolic Execution for the Smart Contract Programming Language Michelson ECOOP Technical Papers Barnabas Arvay University of Freiburg, Thi Thu Ha Doan University of Freiburg, Peter Thiemann University of Freiburg, Germany | ||
13:45 15mTalk | Qafny: A Quantum-Program Verifier ECOOP Technical Papers Liyi Li Iowa State University, Mingwei Zhu University of Maryland, College Park, Rance Cleaveland University of Maryland, Alexander Nicolellis Iowa State University, Yi Lee University of Maryland, College Park, Le Chang University of Maryland, College Park, Xiaodi Wu University of Maryland | ||
14:00 15mTalk | Verifying Lock-free Search Structure Templates ECOOP Technical Papers Nisarg Patel New York University, Dennis Shasha New York University, Thomas Wies New York University | ||
14:15 15mTalk | Mover Logic: A Concurrent Program Logic for Reduction and Rely-Guarantee Reasoning ECOOP Technical Papers | ||
14:30 15mTalk | Compositional Symbolic Execution for Correctness and Incorrectness Reasoning ECOOP Technical Papers Andreas Lööw Imperial College London, Daniele Nantes-Sobrinho Imperial College London, Sacha-Élie Ayoun Imperial College London, Caroline Cronjäger Ruhr-Universität Bochum, Petar Maksimović Imperial College London, UK, Philippa Gardner Imperial College London | ||
14:45 15mTalk | Tenspiler: A Verified Lifting-Based Compiler for Tensor Operations ECOOP Technical Papers Jie Qiu Duolingo, Colin Cai University of California, Berkeley, Sahil Bhatia University of California, Berkeley, Niranjan Hasabnis Code Metal, Sanjit Seshia UC Berkeley, Alvin Cheung University of California at Berkeley |
13:30 - 14:50 | Vulnerability DetectionISSTA Technical Papers at EI 3 Sahulka Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
13:30 20mTalk | Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph ISSTA Technical Papers Xiaoyong Yan Zhejiang University, Biao He Ant Group, Wenbo Shen Zhejiang University, Yu Ouyang Ant Group, Kaihang Zhou Zhejiang University, Xingjian Zhang Zhejiang University, Xingyu Wang Zhejiang University, Yukai Cao Zhejiang University, Rui Chang Zhejiang University DOI | ||
13:50 20mTalk | SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection ISSTA Technical Papers Xin-Cheng Wen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shuzheng Gao Chinese University of Hong Kong, Yang Xiao Chinese Academy of Sciences, Michael Lyu Chinese University of Hong Kong DOI | ||
14:10 20mTalk | CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection ISSTA Technical Papers Hao Wang Tsinghua University, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Mingyang Sun University of Electronic Science and Technology of China, Yuchen Zhou Beijing University of Technology, Han Qiu Tsinghua University, Xi Xiao Tsinghua University DOI | ||
14:30 20mTalk | Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation ISSTA Technical Papers Zhaoyang Chu Huazhong University of Science and Technology, Yao Wan Huazhong University of Science and Technology, Qian Li Curtin University, Yang Wu Huazhong University of Science and Technology, Hongyu Zhang Chongqing University, Yulei Sui UNSW, Guandong Xu University of Technology, Hai Jin Huazhong University of Science and Technology DOI Pre-print |
13:30 - 15:00 | |||
13:30 12mTalk | Generalized Concurrency Testing Tool for Distributed Systems Tool Demonstrations Ege Berkay Gulcan Delft University of Technology, João Neto Delft University of Technology, Burcu Kulahcioglu Ozkan Delft University of Technology DOI Media Attached | ||
13:42 12mTalk | Testing concurrent algorithms on JVM with Lincheck and IntelliJ IDEADistinguished Tool Demo Award Tool Demonstrations Alexander Potapov JetBrains, Maksim Zuev JetBrains, Evgenii Moiseenko JetBrains Research, Nikita Koval JetBrains | ||
13:55 12mTalk | JCWIT: A Correctness-Witness Validator for Java Programs based on Bounded Model Checking Tool Demonstrations Zaiyu Cheng University of Manchester, Tong Wu University of Manchester, Peter Schrammel University of Sussex and Diffblue Ltd, Norbert Tihanyi Eotvos Lorand University, Eddie B. de Lima Filho TPV Technology, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil | ||
14:08 12mTalk | ESBMC-Python: A Bounded Model Checker for Python Programs Tool Demonstrations Bruno Farias University of Manchester, Rafael Menezes University of Manchester, Eddie B. de Lima Filho TPV Technology, Youcheng Sun University of Manchester, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil Media Attached | ||
14:21 12mTalk | Panda: A Concurrent Scheduler for Compiler-Based Tools Tool Demonstrations Xutong Ma Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI Pre-print Media Attached | ||
14:34 12mTalk | SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries Tool Demonstrations Ningyu He Peking University, Zhehao Zhao Peking University, Hanqin Guan Peking University, Jikai Wang Huazhong University of Science and Technology, Shreya Mathews IMC University of Applied Sciences Krems, Ding Li Peking University, Haoyu Wang Huazhong University of Science and Technology, Xiangqun Chen Peking University, Yao Guo Peking University | ||
14:47 12mTalk | PolyTracker: Whole-Input Dynamic Information Flow TracingDistinguished Tool Demo Award Tool Demonstrations Evan Sultanik Trail of Bits, Marek Surovič Trail of Bits, Henrik Brodin Trail of Bits, Kelly Kaoudis Trail of Bits, Facundo Tuesca Trail of Bits, Carson Harmon Trail of Bits, Lisa Overall Trail of Bits, Joseph Sweeney Trail of Bits, Bradford Larsen Trail of Bits |
13:30 - 14:50 | Fairness and Safety of Neural NetworksISSTA Technical Papers at EI 7 Chair(s): Jingyi Wang Zhejiang University | ||
13:30 20mTalk | NeuFair: Neural Network Fairness Repair with Dropout ISSTA Technical Papers Vishnu Asutosh Dasu Pennsylvania State University, Ashish Kumar Pennsylvania State University, Saeid Tizpaz-Niari University of Texas at El Paso, Gang (Gary) Tan Pennsylvania State University DOI | ||
13:50 20mTalk | A Large-Scale Empirical Study on Improving the Fairness of Image Classification Models ISSTA Technical Papers Junjie Yang College of Intelligence and Computing, Tianjin University, Jiajun Jiang Tianjin University, Zeyu Sun Institute of Software at Chinese Academy of Sciences, Junjie Chen Tianjin University DOI | ||
14:10 20mTalk | Efficient DNN-Powered Software with Fair Sparse Models ISSTA Technical Papers Xuanqi Gao Xi’an Jiaotong University, Weipeng Jiang Xi’an Jiaotong University, Juan Zhai University of Massachusetts at Amherst, Shiqing Ma University of Massachusetts at Amherst, Xiaoyu Zhang Xi’an Jiaotong University, Chao Shen Xi’an Jiaotong University DOI Pre-print | ||
14:30 20mTalk | Synthesizing Boxes Preconditions for Deep Neural Networks ISSTA Technical Papers Zengyu Liu National University of Defense Technology, Liqian Chen National University of Defense Technology, Wanwei Liu National University of Defense Technology, Ji Wang National University of Defense Technology DOI |
13:30 - 14:30 | Test GenerationISSTA Technical Papers at EI 9 Hlawka Chair(s): Alessio Gambi Austrian Institute of Technology (AIT) | ||
13:30 20mTalk | Domain Adaptation for Code Model-Based Unit Test Case Generation ISSTA Technical Papers Jiho Shin York University, Sepehr Hashtroudi University of Calgary, Hadi Hemmati York University, Song Wang York University DOI | ||
13:50 20mTalk | Practitioners’ Expectations on Automated Test Generation ISSTA Technical Papers Xiao Yu Huawei, Lei Liu Xi’an Jiaotong University, Xing Hu Zhejiang University, Jacky Keung City University of Hong Kong, Xin Xia Huawei, David Lo Singapore Management University DOI | ||
14:10 20mTalk | UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing ISSTA Technical Papers Yifeng He University of California at Davis, Jiabo Huang Tencent, Yuyang Rong University of California at Davis, Yiwen Guo Unaffiliated, Ethan Wang University of California at Davis, Hao Chen University of California at Davis DOI |
15:00 - 15:30 | |||
15:30 - 16:50 | Empirical StudiesISSTA Technical Papers at EI 10 Fritz Paschke Chair(s): Cristian Cadar Imperial College London | ||
15:30 20mTalk | Bugs in Pods: Understanding Bugs in Container Runtime Systems ISSTA Technical Papers Jiongchi Yu Singapore Management University, Xiaofei Xie Singapore Management University, Cen Zhang Nanyang Technological University, Sen Chen Tianjin University, Yuekang Li UNSW, Wenbo Shen Zhejiang University DOI | ||
15:50 20mTalk | An Empirical Study on Kubernetes Operator Bugs ISSTA Technical Papers Qingxin Xu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:10 20mTalk | Understanding Misconfigurations in ROS: An Empirical Study and Current Approaches ISSTA Technical Papers Paulo Canelas Carnegie Mellon University, Bradley Schmerl Carnegie Mellon University, Alcides Fonseca LASIGE; University of Lisbon, Christopher Steven Timperley Carnegie Mellon University DOI Pre-print Media Attached | ||
16:30 20mTalk | An In-Depth Study of Runtime Verification Overheads during Software TestingACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers DOI |
15:30 - 16:45 | Software SystemsECOOP Technical Papers at EI 2 Pichelmayer Chair(s): Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE | ||
15:30 18mTalk | Understanding Concurrency Bugs in Real-World Programs with Kotlin Coroutines ECOOP Technical Papers Bob Brockbernd Delft University of Technology, Nikita Koval JetBrains, Arie van Deursen Delft University of Technology, Burcu Kulahcioglu Ozkan Delft University of Technology | ||
15:48 18mTalk | Runtime Instrumentation for Reactive Components ECOOP Technical Papers Luca Aceto Reykjavik University, Duncan Paul Attard University of Glasgow, Adrian Francalanza University of Malta, Anna Ingolfsdottir Reykjavik University | ||
16:07 18mTalk | HOBBIT: Hashed Object Based InTegrity ECOOP Technical Papers Matthias Bernad μCSRL, CODE Research Institute, University of the Bundeswehr Munich, Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
16:26 18mTalk | Pipit on the Post: proving pre- and post-conditions of reactive systems ECOOP Technical Papers Amos Robinson Australian National University, Australia, Alex Potanin Australian National University |
15:30 - 17:10 | Static Analysis and VerificationISSTA Technical Papers at EI 3 Sahulka Chair(s): Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
15:30 20mTalk | Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace Checking ISSTA Technical Papers Weilin Luo Sun Yat-sen University, Pingjia Liang Sun Yat-sen University, Junming Qiu Sun Yat-sen University, Polong Chen Sun Yat-sen University, Hai Wan Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Weiyuan Fang Sun Yat-sen University DOI | ||
15:50 20mTalk | Interprocedural Path Complexity Analysis ISSTA Technical Papers Mira Kaniyur Harvey Mudd College, Ana Cavalcante-Studart Harvey Mudd College, Yihan Yang Harvey Mudd College, Sangeon Park Harvey Mudd College, David Chen Harvey Mudd College, Duy Lam Harvey Mudd College, Lucas Bang Harvey Mudd College DOI | ||
16:10 20mTalk | VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information Extraction ISSTA Technical Papers Thanh-Dat Nguyen University of Melbourne, Tung Do-Viet Cinnamon AI, Hung Nguyen-Duy Independent Researcher, Tuan-Hai Luu Cinnamon AI, Hung Le Deakin University, Xuan-Bach D. Le University of Melbourne, Patanamon Thongtanunam University of Melbourne DOI Pre-print | ||
16:30 20mTalk | Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks ISSTA Technical Papers Huaien Zhang Hong Kong Polytechnic University; Southern University of Science and Technology, Yu Pei Hong Kong Polytechnic University, Shuyun Liang Southern University of Science and Technology, Zezhong Xing Southern University of Science and Technology, Shin Hwei Tan Concordia University DOI | ||
16:50 20mTalk | API Misuse Detection via Probabilistic Graphical Model ISSTA Technical Papers Yunlong Ma Beihang University, Wentong Tian Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University, Li Li Beihang University DOI |
15:30 - 16:50 | |||
15:30 80mTalk | Lincheck: A Practical Framework for Testing Concurrent Data Structures on JVM CAKC Nikita Koval JetBrains |
15:30 - 17:00 | |||
15:30 12mTalk | SMBugFinder: An Automated Framework for Testing Protocol Implementations for State Machine Bugs Tool Demonstrations Paul Fiterau-Brostean Uppsala University, Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens, Fredrik Tåquist Uppsala University, Bengt Jonsson Uppsala University, Sweden DOI Media Attached | ||
15:42 12mTalk | FRAFOL: FRAmework FOr Learning mutation testing Tool Demonstrations Pedro Tavares Faculty of Engineering, University of Porto, Ana Paiva INESC TEC, Faculty of Engineering, University of Porto, Domenico Amalfitano University of Naples Federico II, René Just University of Washington | ||
15:55 12mTalk | FixCheck: A Tool for Improving Patch Correctness Analysis Tool Demonstrations Facundo Molina IMDEA Software Institute, Juan Manuel Copia IMDEA Software Institute; Universidad Politécnica de Madrid, Alessandra Gorla IMDEA Software Institute | ||
16:08 12mTalk | HECS: A Hypergraph Learning-based System for Detecting Extract Class Refactoring Opportunities Tool Demonstrations Luqiao Wang Xidian University, Qiangqiang Wang Xidian University, Jiaqi Wang Xidian University, Yutong Zhao University of Central Missouri, Minjie Wei Xidian University, Zhou Quan Xidian University, Di Cui Xidian University, Qingshan Li Xidian University | ||
16:21 12mTalk | DMMPP: Constructing Dummy Main Methods for Android Apps with Path-sensitive Predicates Tool Demonstrations Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
16:34 12mTalk | FunRedisp: A Function Redispatch Tool to Reduce Invocation Gas Fees in Solidity Smart Contracts Tool Demonstrations Yunqi Liu Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology Media Attached | ||
16:47 12mTalk | The Flexcrash Platform for Testing Autonomous Vehicles in Mixed-Traffic Scenarios Tool Demonstrations Alessio Gambi Austrian Institute of Technology (AIT), Shreya Mathews IMC University of Applied Sciences Krems, Benedikt Steininger IMC University of Applied Sciences Krems, Mykhailo Poienko IMC University of Applied Sciences Krems, David Bobek IMC University of Applied Sciences Krems |
15:30 - 17:10 | |||
15:30 20mTalk | Automated Program Repair via Conversation: Fixing 162 out of 337 Bugs for $0.42 Each using ChatGPT ISSTA Technical Papers Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
15:50 20mTalk | ThinkRepair: Self-Directed Automated Program Repair ISSTA Technical Papers Xin Yin Zhejiang University, Chao Ni Zhejiang University, Shaohua Wang Central University of Finance and Economics, Zhenhao Li York University, Limin Zeng Zhejiang University, Xiaohu Yang Zhejiang University DOI | ||
16:10 20mTalk | BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming Assignments ISSTA Technical Papers Linna Xie Nanjing University, Chongmin Li Nanjing University, Yu Pei Hong Kong Polytechnic University, Tian Zhang Nanjing University, Minxue Pan Nanjing University DOI | ||
16:30 20mTalk | CREF: An LLM-Based Conversational Software Repair Framework for Programming Tutors ISSTA Technical Papers Boyang Yang Yanshan University; Beijing JudaoYouda Network Technology, Haoye Tian University of Melbourne, Weiguo Pian University of Luxembourg, Haoran Yu Beijing JudaoYouda Network Technology, Haitao Wang Beijing JudaoYouda Network Technology, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Shunfu Jin Yanshan University DOI | ||
16:50 20mTalk | One Size Does Not Fit All: Multi-granularity Patch Generation for Better Automated Program RepairACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Ming Wen Huazhong University of Science and Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology DOI Pre-print |
15:30 - 17:10 | Testing and Repairing Neural NetworksISSTA Technical Papers at EI 9 Hlawka Chair(s): Mike Papadakis University of Luxembourg | ||
15:30 20mTalk | Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters ISSTA Technical Papers Purvish Jajal Purdue University, Wenxin Jiang Purdue University, Arav Tewari Purdue University, Erik Kocinare Purdue University, Joseph Woo Purdue University, Anusha Sarraf Purdue University, Yung-Hsiang Lu Purdue University, George K. Thiruvathukal Loyola University Chicago, James C. Davis Purdue University DOI Pre-print | ||
15:50 20mTalk | Interpretability Based Neural Network Repair ISSTA Technical Papers Zuohui Chen Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Jun Zhou Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Youcheng Sun University of Manchester, Jingyi Wang Zhejiang University, Qi Xuan Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Xiaoniu Yang Zhejiang University of Technology; National Key Laboratory of Electromagnetic Space Security DOI | ||
16:10 20mTalk | See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing ISSTA Technical Papers Yuanyuan Yuan Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Zhendong Su ETH Zurich DOI | ||
16:30 20mTalk | Isolation-Based Debugging for Neural Networks ISSTA Technical Papers Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Youcheng Sun University of Manchester, Peng Cheng Zhejiang University, Jiming Chen Zhejiang University; Hangzhou Dianzi University DOI | ||
16:50 20mTalk | Certified Continual Learning for Neural Network Regression ISSTA Technical Papers DOI |
16:45 - 17:00 | |||
16:45 15mDay closing | Closing and Invitation to ECOOP 2025 ECOOP Technical Papers |
17:45 - 23:00 | BanquetSocial Events at Fuhrgassl-Huber We will take buses from the conference venue to go to the banquet. | ||
Thu 19 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 09:00 | |||
09:00 - 10:00 | |||
09:00 5mDay opening | Welcome from the Chairs MPLR | ||
09:05 55mKeynote | Can WebAssembly Be Software’s Final Substrate? (Keynote) MPLR DOI |
09:00 - 10:00 | Morning keynoteVORTEX at EI 4 Reithoffer Chair(s): Davide Ancona DIBRIS, University of Genova, Italy | ||
09:00 60mKeynote | Runtime Invariant Checking in Robotic Systems and Deep Learning Models VORTEX File Attached |
09:00 - 10:00 | |||
09:00 60mKeynote | The Overlooked Steps in Program Analysis: Designing by People for People ISSTA Keynotes |
10:00 - 10:30 | |||
10:30 - 11:30 | |||
10:30 60mKeynote | Advanced Debugging Techniques In Practice DEBT Robert O'Callahan Google DOI |
10:30 - 11:50 | Logging and Field BugsISSTA Technical Papers at EI 10 Fritz Paschke Chair(s): Willem Visser Amazon Web Services | ||
10:30 20mResearch paper | A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We? ISSTA Technical Papers Zhihan Jiang Chinese University of Hong Kong, Jinyang Liu Chinese University of Hong Kong, Junjie Huang Chinese University of Hong Kong, Yichen LI Chinese University of Hong Kong, Yintong Huo Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Zhuangbin Chen Sun Yat-sen University, Jieming Zhu Huawei Noah’s Ark Lab, Michael Lyu Chinese University of Hong Kong DOI Pre-print | ||
10:50 20mTalk | FastLog: An End-to-End Method to Efficiently Generate and Insert Logging Statements ISSTA Technical Papers Xiaoyuan Xie Wuhan University, Zhipeng Cai Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Jifeng Xuan Wuhan University DOI | ||
11:10 20mTalk | Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs ISSTA Technical Papers Shiwen Shan Sun Yat-sen University, Yintong Huo Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Yichen LI Chinese University of Hong Kong, Dan Li Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
11:30 20mTalk | Foliage: Nourishing Evolving Software by Characterizing and Clustering Field Bugs ISSTA Technical Papers Zhanyao Lei Shanghai Jiao Tong University, Yixiong Chen Shanghai Jiao Tong University, Mingyuan Xia AppetizerIO, Zhengwei Qi Shanghai Jiao Tong University DOI |
10:30 - 11:50 | |||
10:30 25mPaper | Lazy Sparse Conditional Constant Propagation in the Sea of Nodes MPLR DOI | ||
10:55 25mPaper | Mutator-Driven Object Placement using Load Barriers MPLR A: Jonas Norlinder Uppsala University, A: Albert Mingkun Yang Oracle, A: David Black-Schaffer Uppsala University, A: Tobias Wrigstad Uppsala University DOI | ||
11:20 25mPaper | Interactive Programming for Microcontrollers by Offloading Dynamic Incremental Compilation MPLR A: Fumika Mochizuki University of Tokyo, A: Tetsuro Yamazaki University of Tokyo, A: Shigeru Chiba University of Tokyo DOI |
10:30 - 11:50 | BlockchainISSTA Technical Papers at EI 3 Sahulka Chair(s): Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens | ||
10:30 20mTalk | DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3 ISSTA Technical Papers Zhiying Wu Sun Yat-sen University, Jiajing Wu Sun Yat-sen University, Hui Zhang Sun Yat-sen University, Ziwei Li Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Qing Xia Institute of Software at Chinese Academy of Sciences, Gang Fan Ant Group, Yi Zhen Independent DOI | ||
10:50 20mTalk | LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts ISSTA Technical Papers Peilin Zheng Sun Yat-sen University, Bowei Su Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China, Neng Zhang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI File Attached | ||
11:10 20mTalk | Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients ISSTA Technical Papers Shuohan Wu Hong Kong Polytechnic University, Zihao Li Hong Kong Polytechnic University, Hao Zhou Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Jianfeng Li Xi’an Jiaotong University, Haoyu Wang Huazhong University of Science and Technology DOI | ||
11:30 20mTalk | DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications ISSTA Technical Papers Maoyi Xie Nanyang Technological University, Ming Hu Nanyang Technological University, Ziqiao Kong Nanyang Technological University, Cen Zhang Nanyang Technological University, Yebo Feng Nanyang Technological University, Haijun Wang Xi’an Jiaotong University, Yue Xue MetaTrust Labs, Hao Zhang MetaTrust Labs, Ye Liu Nanyang Technological University, Yang Liu Nanyang Technological University DOI |
10:30 - 12:00 | |||
10:30 30mTalk | Runtime Verified Neural Networks for Cyber-Physical Systems VORTEX A: Dhiren Tripuramallu Indian Institute of Technology Bhubaneswar, A: Ayush Anand Indian Institute of Technology Bhubaneswar, A: Srinivas Pinisetty Indian Institute of Technology Bhubaneswar, A: Hammond Pearce University of New South Wales, Sydney, A: Partha Roop University of Auckland File Attached | ||
11:00 30mTalk | Optimising Aggregate Monitors for Spatial Logic of Closure Spaces Properties VORTEX A: Gianluca Aguzzi Alma Mater Studiorum - Università di Bologna, A: Giorgio Audrito Università di Torino, A: Mirko Viroli Alma Mater Studiorum - Università di Bologna File Attached | ||
11:30 30mTalk | Real-Time Guarantees for SLCS Monitors in XC VORTEX A: Giorgio Audrito Università di Torino, A: Ferruccio Damiani University of Turin, A: Gianluca Torta |
10:30 - 12:00 | Hands-on: Testing DSLs with DSLs in Rascal and TESTARA-TEST at EI 5 Hochenegg In celebration of the 15th anniversary of A-TEST, we have chosen a theme that aligns well with both ISSTA and ECOOP: “Using DSLs for testing and the testing of DSLs.” To mark this A-TEST milestone and to put the “work” in workshop, we are hosting a hands-on session where participants can roll up their sleeves and actively engage in experimenting to test a DSL QL, a language designed for creating web-based questionnaire forms. When testing a DSL, it is essential to focus on both the language’s implementation (including syntax, type checking, evaluation and rendering) as well as the correct execution of the code generated by the compiler. These aspects ensure the DSL is both robust and effective in its intended domain. In our workshop, we will approach this from two angles. For testing the language implementation part, we will use a DSL, named TestQL, which been explicitly written in Rascal for testing purposes. For the execution part, we will employ automated scriptless GUI testing with TESTAR to verify the execution of the generated code. But that is not all—the oracles used during the scriptless testing will be automatically generated by using the domain-specific knowledge of state invariants within the DSL, demonstrating how domain knowledge can enhance testing effectiveness. | ||
10:30 - 11:50 | |||
10:30 20mTalk | Automating Zero-Shot Patch Porting for Hard Forks ISSTA Technical Papers Shengyi Pan Zhejiang University, You Wang Zhejiang University, Zhongxin Liu Zhejiang University, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University DOI Pre-print | ||
10:50 20mTalk | Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial Bugs ISSTA Technical Papers Yicheng Ouyang University of Illinois at Urbana-Champaign, Jun Yang University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
11:10 20mTalk | Neurosymbolic Repair of Test Flakiness ISSTA Technical Papers Yang Chen University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign DOI | ||
11:30 20mTalk | AutoCodeRover: Autonomous Program Improvement ISSTA Technical Papers Yuntong Zhang National University of Singapore, Haifeng Ruan National University of Singapore, Zhiyu Fan National University of Singapore, Abhik Roychoudhury National University of Singapore DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Distance-Aware Test Input Selection for Deep Neural Networks ISSTA Technical Papers Zhong Li Nanjing University, Zhengfeng Xu Nanjing University, Ruihua Ji Nanjing University, Minxue Pan Nanjing University, Tian Zhang Nanjing University, Linzhang Wang Nanjing University, Xuandong Li Nanjing University DOI | ||
10:50 20mTalk | Test Selection for Deep Neural Networks using Meta-Models with Uncertainty Metrics ISSTA Technical Papers Demet Demir Middle East Technical University, Aysu Betin Can Middle East Technical University, Elif Surer Middle East Technical University DOI | ||
11:10 20mTalk | Datactive: Data Fault Localization for Object Detection Systems ISSTA Technical Papers Yining Yin Nanjing University, Yang Feng Nanjing University, Shihao Weng Nanjing University, Yuan Yao Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing University DOI | ||
11:30 20mTalk | TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development ISSTA Technical Papers Xiangshan Gao Zhejiang University; Huawei Technology, Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Jie Shi Huawei International, Peng Cheng Zhejiang University, Jiming Chen Zhejiang University; Hangzhou Dianzi University DOI |
11:30 - 12:00 | |||
11:30 30mTalk | In-field debugging of automotive microcontrollers for highest system availability DEBT Gasper Skvarc Bozic Infineon Technologies AG, Ibai Irigoyen Ceberio Infineon Technologies AG, Albrecht Mayer Infineon Technologies AG DOI |
12:00 - 13:30 | |||
12:00 - 13:30 | |||
13:30 - 15:00 | |||
13:30 30mTalk | Bug localisation in Model-Based Testing Using Model-Centric Shrinking DEBT Susan van den Broek University of Amsterdam, Ana Oprescu University of Amsterdam, Theo C Ruys Axini B.V. DOI | ||
14:00 30mTalk | A Reversible Debugger for MPI Applications DEBT Mihkel Tiks Tartu University, Ott-Kaarel Martens Tartu University, Eero Vainikko Tartu University, Stefan Kuhn Tartu University DOI | ||
14:30 30mTalk | Language-Agnostic Debugging for Microcontrollers DEBT Carlos Rojas Castillo Vrije Universiteit Brussel, Matteo Marra Nokia Bell Labs, Belgium, Elisa Gonzalez Boix Vrije Universiteit Brussel DOI |
13:30 - 14:50 | WebAssembly and BrowsersISSTA Technical Papers at EI 10 Fritz Paschke Chair(s): Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
13:30 20mTalk | Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment ISSTA Technical Papers Jiashui Wang Zhejiang University, Peng Qian Zhejiang University, Xilin Huang Ant Group, Xinlei Ying Ant Group, Yan Chen Northwestern University, Shouling Ji Zhejiang University, Jianhai Chen Zhejiang University, Jundong Xie Ant Group, Long Liu Ant Group DOI | ||
13:50 20mTalk | WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation ISSTA Technical Papers Shangtong Cao Beijing University of Posts and Telecommunications, Ningyu He Peking University, Xinyu She Huazhong University of Science and Technology, Yixuan Zhang Peking University, Mu Zhang University of Utah, Haoyu Wang Huazhong University of Science and Technology DOI | ||
14:10 20mTalk | Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation ISSTA Technical Papers DOI |
13:30 - 14:50 | |||
13:30 15mShort-paper | mruby on Resource-Constrained Low-Power Coprocessors of Embedded Devices MPLR A: Go Suzuki Tokyo Institute of Technology, A: Takuo Watanabe Tokyo Institute of Technology, A: Sosuke Moriguchi Tokyo Institute of Technology DOI Pre-print Media Attached File Attached | ||
13:45 15mShort-paper | Imagine There’s No Source Code: Replay Diagnostic Location Information in Dynamic EDSL Meta-programming MPLR DOI | ||
14:00 25mPaper | Existential Containers in Scala MPLR DOI | ||
14:25 25mPaper | Quff: A Dynamically Typed Hybrid Quantum-Classical Programming Language MPLR A: Christopher John Wright University of Manchester, A: Mikel Luján University of Manchester, A: Pavlos Petoumenos University of Manchester, A: John Goodacre University of Manchester DOI |
13:30 - 14:50 | DatabasesISSTA Technical Papers at EI 3 Sahulka Chair(s): Manuel Rigger National University of Singapore | ||
13:30 20mTalk | Testing Gremlin-Based Graph Database Systems via Query Disassembling ISSTA Technical Papers Yingying Zheng Institute of Software at Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences, Lei Tang Institute of Software at Chinese Academy of Sciences, Ziyu Cui Institute of Software at Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiansen Song Institute of Software at Chinese Academy of Sciences, Liang Xu Jinling Institute of Technology, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, Wei Wang Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Hua Zhong Institute of Software at Chinese Academy of Sciences, Tao Huang Institute of Software at Chinese Academy of Sciences DOI | ||
13:50 20mTalk | SQLess: Dialect-Agnostic SQL Query Simplification ISSTA Technical Papers Li Lin Xiamen University, Zongyin Hao Xiamen University, Chengpeng Wang Hong Kong University of Science and Technology, Zhuangda Wang Xiamen University, Rongxin Wu Xiamen University, Gang Fan Ant Group DOI | ||
14:10 20mTalk | Testing Graph Database Systems with Graph-State Persistence Oracle ISSTA Technical Papers Shuang Liu Renmin University of China, Junhao Lan Tianjin University, China, Xiaoning Du Monash University, Jiyuan Li Tianjin University, China, Wei Lu Renmin University of China, China, Jiajun Jiang Tianjin University, Xiaoyong Du Renmin University of China DOI |
13:30 - 14:30 | |||
13:30 60mKeynote | R2U2: Runtime Verification Takes Off! VORTEX |
13:30 - 15:00 | |||
13:30 - 14:50 | Execution and ProfilingISSTA Technical Papers at EI 7 Chair(s): Rohan Padhye Carnegie Mellon University | ||
13:30 20mTalk | MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination Indexing ISSTA Technical Papers Tianyi Yang Chinese University of Hong Kong, Cheryl Lee Chinese University of Hong Kong, Jiacheng Shen Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Cong Feng Huawei Cloud Computing Technology, Yongqiang Yang Huawei Cloud Computing Technology, Michael Lyu Chinese University of Hong Kong DOI | ||
13:50 20mTalk | Feedback-Directed Partial Execution ISSTA Technical Papers Ishrak Hayet North Carolina State University, Adam Scott North Carolina State University, Marcelo d'Amorim North Carolina State University DOI | ||
14:10 20mTalk | Define-Use Guided Path Exploration for Better Forced Execution ISSTA Technical Papers Dongnan He Renmin University of China, Dongchen Xie Renmin University of China, Yujie Wang Renmin University of China, Wei You Renmin University of China, Bin Liang Renmin University of China, Jianjun Huang Renmin University of China, Wenchang Shi Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI | ||
14:30 20mTalk | SelfPiCo: Self-Guided Partial Code Execution with LLMs ISSTA Technical Papers Zhipeng Xue , Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Shaohua Wang Central University of Finance and Economics, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University DOI |
13:30 - 14:50 | Static analysisISSTA Technical Papers at EI 9 Hlawka Chair(s): Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE | ||
13:30 20mTalk | Precise Compositional Buffer Overflow Detection via Heap DisjointnessACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers Yiyuan Guo Hong Kong University of Science and Technology, Peisen Yao Zhejiang University, Charles Zhang Hong Kong University of Science and Technology DOI Pre-print | ||
13:50 20mTalk | Finding Cuts in Static Analysis Graphs to Debloat Software ISSTA Technical Papers Christoph Blumschein Hasso Plattner Institute; University of Potsdam, Fabio Niephaus Oracle Labs, Codrut Stancu Oracle Labs, Christian Wimmer Oracle Labs, Jens Lincke Hasso Plattner Institute; University of Potsdam, Robert Hirschfeld Hasso Plattner Institute; University of Potsdam DOI Pre-print | ||
14:10 20mTalk | Scalable, Sound, and Accurate Jump Table Analysis ISSTA Technical Papers Huan Nguyen Stony Brook University, Soumyakant Priyadarshan Stony Brook University, R. Sekar Stony Brook University DOI | ||
14:30 20mTalk | Better Not Together: Staged Solving for Context-Free Language Reachability ISSTA Technical Papers Chenghang Shi Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haofeng Li Institute of Computing Technology at Chinese Academy of Sciences, Jie Lu Institute of Computing Technology at Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI Pre-print |
14:30 - 15:00 | |||
14:30 30mTalk | RVsec: Towards a Comprehensive Technology Stack for Secure Deployment of Software Monitors VORTEX File Attached |
15:00 - 15:30 | |||
15:30 - 17:00 | |||
15:30 20mDemonstration | Concolic Multiverse Debugging DEBT Maarten Steevens Ghent University, Belgium, Tom Lauwaerts Universiteit Gent, Belgium, Christophe Scholliers Universiteit Gent, Belgium DOI | ||
15:50 20mDemonstration | Reversible Debugging of Erlang Programs in CauDEr DEBT DOI | ||
16:10 20mDemonstration | Abstract Debugging with GobPie DEBT Karoliine Holter University of Tartu, Estonia, Juhan Oskar Hennoste University of Tartu, Simmo Saan University of Tartu, Estonia, Patrick Lam University of Waterloo, Vesal Vojdani University of Tartu DOI Media Attached | ||
16:30 20mDemonstration | Localizer - a visual debugging assistant for Python programs DEBT Shehroz Khan Åbo Akademi University, Gaadha Sudheerbabu Åbo Akademi University, Dragos Truscan Åbo Akademi University, Tanwir Ahmad Åbo Akademi University DOI | ||
16:50 10mDay closing | Closing by the workshop organizers DEBT |
15:30 - 17:10 | Vulnerabilities and MalwareISSTA Technical Papers at EI 10 Fritz Paschke Chair(s): Wei You Renmin University of China | ||
15:30 20mTalk | Silent Taint-Style Vulnerability Fixes Identification ISSTA Technical Papers Zhongzhen Wen Nanjing University, Jiayuan Zhou Huawei, Minxue Pan Nanjing University, Shaohua Wang Central University of Finance and Economics, Xing Hu Zhejiang University, Tongtong Xu Huawei, Tian Zhang Nanjing University, Xuandong Li Nanjing University DOI | ||
15:50 20mTalk | FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor ISSTA Technical Papers Zhenyu Ye Hunan University, Lei Zhou National University of Defense Technology, Fengwei Zhang Southern University of Science and Technology, Wenqiang Jin Hunan University, Zhenyu Ning Hunan University; Xinchuang Haihe Laboratory, Yupeng Hu Hunan University, Zheng Qin Hunan University DOI | ||
16:10 20mTalk | Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset ISSTA Technical Papers Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
16:30 20mTalk | PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software ISSTA Technical Papers Kaixuan Li East China Normal University; Nanyang Technological University, Jian Zhang Nanyang Technological University, Sen Chen Tianjin University, Han Liu East China Normal University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University DOI Pre-print | ||
16:50 20mTalk | An Empirical Study of Static Analysis Tools for Secure Code Review ISSTA Technical Papers Wachiraphan (Ping) Charoenwet University of Melbourne, Patanamon Thongtanunam University of Melbourne, Thuan Pham University of Melbourne, Christoph Treude Singapore Management University DOI |
15:30 - 16:50 | |||
15:30 15mShort-paper | Towards Realistic Results for Instrumentation-Based Profilers for JIT-Compiled Systems MPLR A: Humphrey Burchell University of Kent, A: Octave Larose University of Kent, A: Stefan Marr University of Kent DOI Pre-print | ||
15:45 15mShort-paper | Toward Declarative Auditing of Java Software for Graceful Exception Handling MPLR DOI | ||
16:00 25mPaper | Dynamic Possible Source Count Analysis for Data Leakage Prevention MPLR A: Eri Ogawa University of Tokyo; IBM Research, A: Tetsuro Yamazaki University of Tokyo, A: Ryota Shioya University of Tokyo DOI | ||
16:25 25mPaper | The Cost of Profiling in the HotSpot Virtual Machine MPLR A: Rene Mueller Huawei Zurich Research Center, A: Maria Carpen-Amarie Huawei Zurich Research Center, A: Matvii Aslandukov Kharkiv National University of Radio Electronics, A: Konstantinos Tovletoglou Independent Researcher DOI | ||
16:50 5mDay closing | Closing Session MPLR Stefan Marr University of Kent |
15:30 - 16:50 | DebuggingISSTA Technical Papers at EI 3 Sahulka Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
15:30 20mTalk | Traceback: A Fault Localization Technique for Molecular Programs ISSTA Technical Papers Michael C. Gerten Iowa State University, James I. Lathrop Iowa State University, Myra Cohen Iowa State University DOI | ||
15:50 20mTalk | C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging ISSTA Technical Papers Xuezhi Song Fudan University, Yijian Wu Fudan University, Shuning Liu Fudan University, Bihuan Chen Fudan University, Yun Lin Shanghai Jiao Tong University, Xin Peng Fudan University DOI | ||
16:10 20mTalk | Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-Call Bugs ISSTA Technical Papers DOI |
15:30 - 16:30 | Afternoon keynote 2VORTEX at EI 4 Reithoffer Chair(s): Davide Ancona DIBRIS, University of Genova, Italy | ||
15:30 60mKeynote | Operational and Declarative Runtime Verification and their Combination VORTEX K: Doron Peled Bar Ilan University, K: Klaus Havelund Jet Propulsion Laboratory, California Institute of Technology File Attached |
15:30 - 17:00 | |||
15:30 30mTalk | First Experiments on Automated Execution of Gherkin Test Specifications with Collaborating LLM Agents A-TEST Severin Bergsmann Software Competence Center Hagenberg (SCCH), Alexander Schmidt Software Competence Center Hagenberg (SCCH), Stefan Fischer Software Competence Center Hagenberg, Rudolf Ramler Software Competence Center Hagenberg (SCCH) | ||
16:00 30mTalk | GreeDDy: Accelerate Parallel DDMIN A-TEST Daniel Vince University of Szeged, Department of Software Engineering, Ákos Kiss University of Szeged, Hungary | ||
16:30 30mTalk | Use of ChatGPT as an Assistant in the End-to-End Test Script Generation for Android Apps A-TEST Boni Garcia Universidad Carlos III de Madrid, Maurizio Leotta DIBRIS, University of Genova, Italy, Filippo Ricca DIBRIS, Università di Genova, Jim Whitehead University of California, Santa Cruz |
15:30 - 17:10 | |||
15:30 20mTalk | One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural Network ISSTA Technical Papers Di Cui Xidian University, Qiangqiang Wang Xidian University, Yutong Zhao University of Central Missouri, Jiaqi Wang Xidian University, Minjie Wei Xidian University, Jingzhao Hu Xidian University, Luqiao Wang Xidian University, Qingshan Li Xidian University DOI | ||
15:50 20mTalk | CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature ISSTA Technical Papers Chenyan Liu Shanghai Jiao Tong University; National University of Singapore, Yufan Cai Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yuhuan Huang Shanghai Jiao Tong University, Yunrui Pei Shanghai Jiao Tong University, Bo Jiang Bytedance Network Technology, Ping Yang Bytedance Network Technology, Jin Song Dong National University of Singapore, Hong Mei Shanghai Jiao Tong University DOI | ||
16:10 20mTalk | Arfa: An Agile Regime-Based Floating-Point Optimization Approach for Rounding Errors ISSTA Technical Papers Jinchen Xu Information Engineering University, Mengqi Cui Information Engineering University, Fei Li Information Engineering University, Zuoyan Zhang Hunan University, Hongru Yang Information Engineering University, Bei Zhou Information Engineering University, Jie Zhao Hunan University DOI | ||
16:30 20mTalk | Automated Deep Learning Optimization via DSL-Based Source Code Transformation ISSTA Technical Papers Ruixin Wang Purdue University, Minghai Lu Purdue University, Cody Hao Yu BosonAI, Yi-Hsiang Lai Amazon Web Services, Tianyi Zhang Purdue University DOI |
15:30 - 17:10 | Analyzing Neural ModelsISSTA Technical Papers at EI 9 Hlawka Chair(s): Saeid Tizpaz-Niari University of Texas at El Paso | ||
15:30 20mTalk | Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models ISSTA Technical Papers Mingyi Zhou Monash University, Xiang Gao Beihang University, Pei Liu CSIRO’s Data61, John Grundy Monash University, Chunyang Chen TU Munich, Xiao Chen University of Newcastle, Li Li Beihang University DOI | ||
15:50 20mTalk | Decomposition of Deep Neural Networks into Modules via Mutation Analysis ISSTA Technical Papers Ali Ghanbari Auburn University DOI | ||
16:10 20mTalk | Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware Prompts ISSTA Technical Papers Hao Guan University of Queensland; Southern University of Science and Technology, Guangdong Bai University of Queensland, Yepang Liu Southern University of Science and Technology DOI | ||
16:30 20mTalk | DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation ISSTA Technical Papers Mingke Yang ShanghaiTech University, Yuqi Chen ShanghaiTech University, Yi Liu Nanyang Technological University, Ling Shi Nanyang Technological University DOI | ||
16:50 20mTalk | Evaluating Deep Neural Networks in Deployment: A Comparative Study (Replicability Study) ISSTA Technical Papers Eduard Pinconschi Carnegie Mellon University, Divya Gopinath KBR; NASA Ames, Rui Abreu INESC-ID; University of Porto, Corina S. Păsăreanu Carnegie Mellon University; NASA Ames DOI |
16:30 - 17:30 | Afternoon talks 2VORTEX at EI 4 Reithoffer Chair(s): Davide Ancona DIBRIS, University of Genova, Italy | ||
16:30 30mTalk | Devising a TraceObject Class for Improved Runtime Monitoring of ooRexx Applications VORTEX File Attached | ||
17:00 30mTalk | Identifying Potential Deadlocked Instructions in a Multi-threaded ooRexx Program VORTEX File Attached |
17:00 - 18:00 | |||
17:00 60mPoster | Toward Declarative Auditing of Java Software for Graceful Exception Handling (Poster) MPLR | ||
17:00 60mPoster | Accurate Compilation Replay via Remote JIT Compilation (Poster) MPLR A: Andrej Pečimúth Oracle Labs; Charles University, A: David Leopoldseder Oracle Labs, A: Petr Tuma Charles University |
18:00 - 20:00 | |||
Fri 20 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 09:00 | |||
09:00 - 10:00 | |||
09:00 60mTalk | Miri: Practical Undefined Behavior Detection for Rust ICOOOLPS Ralf Jung ETH Zurich |
09:00 - 10:00 | |||
09:00 60mKeynote | Benchmarks and Replicability in Software Engineering Research: Challenges and Opportunities ISSTA Keynotes |
10:00 - 10:30 | |||
10:30 - 11:50 | |||
10:30 20mTalk | Inconsistencies in TeX-Produced Documents ISSTA Technical Papers DOI Pre-print | ||
10:50 20mTalk | Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis ISSTA Technical Papers Chenyao Suo Tianjin University, Junjie Chen Tianjin University, Shuang Liu Renmin University of China, Jiajun Jiang Tianjin University, Yingquan Zhao Tianjin University, Jianrong Wang Tianjin University DOI | ||
11:10 20mTalk | Towards Understanding the Bugs in Solidity Compiler ISSTA Technical Papers Haoyang Ma Hong Kong University of Science and Technology, Wuqi Zhang Hong Kong University of Science and Technology, Qingchao Shen Tianjin University, Yongqiang Tian Hong Kong University of Science and Technology, Junjie Chen Tianjin University, Shing-Chi Cheung Hong Kong University of Science and Technology DOI | ||
11:30 20mTalk | Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines ISSTA Technical Papers Gao Cuiying Huazhong University of Science and Technology; JD.com, Yueming Wu Nanyang Technological University, Heng Li Huazhong University of Science and Technology, Wei Yuan Huazhong University of Science and Technology, Haoyu Jiang Huazhong University of Science and Technology, Qidan He JD.com, Yang Liu Nanyang Technological University DOI |
10:30 - 11:30 | |||
10:30 60mKeynote | Static Analysis for Software Security: Detecting Data Races in C FTfJP Omar Inverso Gran Sasso Science Institute |
10:30 - 11:50 | |||
10:30 20mTalk | Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries ISSTA Technical Papers Hao Xiong Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Qinming Dai Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Rui Chang Zhejiang University, Mingran Qiu Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Renxiang Wang Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Wenbo Shen Zhejiang University, Yajin Zhou Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center DOI | ||
10:50 20mTalk | Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps ISSTA Technical Papers Dingbang Wang University of Connecticut, Yu Zhao University of Cincinnati, Sidong Feng Monash University, Zhaoxu Zhang University of Southern California, William G.J. Halfond University of Southern California, Chunyang Chen TU Munich, Xiaoxia Sun China Mobile (Suzhou) Software Technology, Jiangfan Shi Zhejiang University, Tingting Yu University of Connecticut DOI | ||
11:10 20mTalk | NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps ISSTA Technical Papers Jikai Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology DOI | ||
11:30 20mTalk | Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes ISSTA Technical Papers Xiaoyi Yang Rochester Institute of Technology, Yuxing Wang Rochester Institute of Technology, Tahmid Rafi University of Texas at San Antonio, Dongfang Liu Rochester Institute of Technology, Xiaoyin Wang University of Texas at San Antonio, Xueling Zhang Rochester Institute of Technology DOI |
10:30 - 12:00 | |||
10:30 90mKeynote | Real World Local-First Deployments In Industry: An Experience Report PLF Borja Arnau de Régil Basáñez DittoLive Pre-print |
10:30 - 12:00 | |||
10:30 60mIndustry talk | Structured concurrency in Hylo ICOOOLPS Lucian Radu Teodorescu Garmin International | ||
11:30 30mResearch paper | Stack-copying Delimited Continuations for Scala Native ICOOOLPS |
10:30 - 11:50 | |||
10:30 20mTalk | Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization ISSTA Technical Papers Zhijie Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Liwei Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haolai Wei Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Gang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
10:50 20mTalk | FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation ISSTA Technical Papers Xizhe Yin Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Zixi Liu Nanjing University, Hongwang Liu Nanjing University, Baowen Xu Nanjing University DOI | ||
11:10 20mTalk | DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling ISSTA Technical Papers Haoran Fang Shanghai Jiao Tong University, Kaikai Zhang Shanghai Jiao Tong University, Donghui Yu Shanghai Jiao Tong University, Yuanyuan Zhang Shanghai Jiao Tong University DOI Pre-print | ||
11:30 20mTalk | Logos: Log Guided Fuzzing for Protocol Implementations ISSTA Technical Papers Feifan Wu Tsinghua University, Zhengxiong Luo National University of Singapore, Yanyang Zhao Tsinghua University, Qingpeng Du Beijing University of Posts and Telecommunications, Junze Yu Tsinghua University, Ruikang Peng Central South University, Heyuan Shi Central South University, Yu Jiang Tsinghua University DOI |
10:30 - 11:50 | Call Graphs and Static AnalysisISSTA Technical Papers at EI 9 Hlawka Chair(s): Julia Rubin The University of British Columbia | ||
10:30 20mTalk | Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language Features ISSTA Technical Papers Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Tobias Roth TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Michael Reif CQSE, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE DOI Pre-print | ||
10:50 20mTalk | Total Recall? How Good Are Static Call Graphs Really? ISSTA Technical Papers Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Anemone Kampkötter TU Dortmund, Johannes Düsing TU Dortmund, Tobias Roth TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Ben Hermann TU Dortmund, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE DOI Pre-print | ||
11:10 20mTalk | Call Graph Soundness in Android Static Analysis ISSTA Technical Papers Jordan Samhi CISPA Helmholtz Center for Information Security, René Just University of Washington, Tegawendé F. Bissyandé University of Luxembourg, Michael D. Ernst University of Washington, Jacques Klein University of Luxembourg Link to publication DOI Pre-print | ||
11:30 20mTalk | Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT ISSTA Technical Papers Elvira Albert Complutense University of Madrid, Jesús Correas Complutense University of Madrid, Pablo Gordillo Complutense University of Madrid, Guillermo Román-Díez Universidad Politécnica de Madrid, Albert Rubio Complutense University of Madrid DOI |
11:30 - 12:00 | |||
11:30 30mTalk | Towards a model checker for Python: pymodcheck FTfJP |
12:00 - 13:30 | |||
13:30 - 14:50 | Smart ContractsISSTA Technical Papers at EI 10 Fritz Paschke Chair(s): Michael Pradel University of Stuttgart | ||
13:30 20mTalk | Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis ISSTA Technical Papers Shuwei Song University of Electronic Science and Technology of China, Jiachi Chen Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Xiapu Luo Hong Kong Polytechnic University, Teng Li University of Electronic Science and Technology of China, Wenwu Yang University of Electronic Science and Technology of China, Leqing Wang University of Electronic Science and Technology of China, Weijie Zhang Jiangsu University of Science and Technology, Feng Luo Hong Kong Polytechnic University, Zheyuan He University of Electronic Science and Technology of China, Yi Lu BitsLab, Pan Li MoveBit DOI | ||
13:50 20mTalk | FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas Fees ISSTA Technical Papers Yunqi Liu Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI | ||
14:10 20mTalk | Identifying Smart Contract Security Issues in Code Snippets from Stack OverflowACM SIGSOFT Distinguished Paper Award ISSTA Technical Papers Jiachi Chen Sun Yat-sen University, Chong Chen Sun Yat-sen University, Jiang Hu Sun Yat-sen University, John Grundy Monash University, Yanlin Wang Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Zibin Zheng Sun Yat-sen University DOI Pre-print | ||
14:30 20mTalk | Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis ISSTA Technical Papers Mingxi Ye Sun Yat-sen University, Xingwei Lin Zhejiang University, Yuhong Nan Sun Yat-sen University, Jiajing Wu Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI |
13:30 - 15:00 | |||
13:30 30mTalk | Sound Static Analysis for Microservices: Utopia? A preliminary experience with LiSA FTfJP Giacomo Zanatta Ca’ Foscari University of Venice, Pietro Ferrara Università Ca' Foscari, Venezia, Italy, Teodors Lisovenko Ca' Foscari University of Venice, Luca Negrini Ca’ Foscari University of Venice, Gianluca Caiazza Ca' Foscari University of Venice, Ruffin White White Robotics | ||
14:00 30mTalk | Towards a Sound Construction of EVM Bytecode Control-flow Graphs FTfJP Vincenzo Arceri University of Parma, Italy, Saverio Mattia Merenda University of Parma, Italy, Greta Dolcetti Ca' Foscari University of Venice - Department of Environmental Sciences, Informatics and Statistics, Luca Negrini Ca’ Foscari University of Venice, Luca Olivieri University Ca' Foscari, Venice, Enea Zaffanella University of Parma, Italy | ||
14:30 30mTalk | Abstract Interpretation of Java Bytecode in Sturdy FTfJP |
13:30 - 15:00 | |||
13:30 30mTalk | Agreement without Coordination - Revisiting Consensus from a Local-First Perspective PLF Julian Haas Technische Universität Darmstadt Pre-print | ||
14:00 30mTalk | Undo and Redo in Concurrent Multifaceted Low-code Application Models PLF Hugo Lourenço OutSystems SA, Carla Ferreira NOVA University Lisbon, João Costa Seco NOVA-LINCS; Nova University of Lisbon | ||
14:30 30mTalk | Orthogonal Synchronization Revisited PLF Gilad Bracha F5 |
13:30 - 15:00 | |||
13:30 - 14:50 | |||
13:30 20mTalk | Bridge and Hint: Extending Pre-trained Language Models for Long-Range Code ISSTA Technical Papers Yujia Chen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Zezhou Yang Harbin Institute of Technology, Hongyu Zhang Chongqing University, Qing Liao Harbin Institute of Technology DOI | ||
13:50 20mTalk | CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding ISSTA Technical Papers Dong Li Chongqing University, Meng Yan Chongqing University, Yaosheng Zhang Chongqing University, Zhongxin Liu Zhejiang University, Chao Liu Chongqing University, Xiaohong Zhang Chongqing University, Ting Chen University of Electronic Science and Technology of China, David Lo Singapore Management University DOI | ||
14:10 20mTalk | Oracle-Guided Program Selection from Large Language Models ISSTA Technical Papers Zhiyu Fan National University of Singapore, Haifeng Ruan National University of Singapore, Sergey Mechtaev Peking University, Abhik Roychoudhury National University of Singapore DOI | ||
14:30 20mTalk | How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation ISSTA Technical Papers Cen Zhang Nanyang Technological University, Yaowen Zheng Nanyang Technological University, Mingqiang Bai Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Ma Nanyang Technological University, Xiaofei Xie Singapore Management University, Yuekang Li UNSW, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University DOI |
13:30 - 14:50 | |||
13:30 20mTalk | Segment-Based Test Case Prioritization: A Multi-objective Approach ISSTA Technical Papers Hieu Huynh Katalon, Nhu Pham Katalon; Ho Chi Minh City University of Science, Tien N. Nguyen University of Texas at Dallas, Vu Nguyen Katalon; Ho Chi Minh City University of Science; Vietnam National University DOI | ||
13:50 20mTalk | Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable Systems ISSTA Technical Papers Chuan Luo Beihang University, Shuangyu Lyu Beihang University, Qiyuan Zhao National University of Singapore, Wei Wu Central South University; Xiangjiang Laboratory, Hongyu Zhang Chongqing University, Chunming Hu Beihang University DOI | ||
14:10 20mTalk | Synthesis-Based Enhancement for GUI Test Case Migration ISSTA Technical Papers Yakun Zhang Peking University, Qihao Zhu DeepSeek-AI, Jiwei Yan Institute of Software at Chinese Academy of Sciences, Chen Liu Peking University, Wenjie Zhang Peking University, Yifan Zhao Peking University, Dan Hao Peking University, Lu Zhang Peking University DOI | ||
14:30 20mTalk | Revisiting Test-Case Prioritization on Long-Running Test Suites ISSTA Technical Papers Runxiang Cheng University of Illinois at Urbana-Champaign, Shuai Wang University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign DOI |
15:00 - 15:30 | |||
15:30 - 16:30 | Analysis of Code OriginISSTA Technical Papers at EI 10 Fritz Paschke Chair(s): Darko Marinov University of Illinois at Urbana-Champaign | ||
15:30 20mTalk | Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge ISSTA Technical Papers Xiaowei Guo Huazhong University of Science and Technology, Cai Fu Huazhong University of Science and Technology, Juan Chen Huazhong University of Science and Technology, Hongle Liu Huazhong University of Science and Technology, Lansheng Han Huazhong University of Science and Technology, Wenjin Li NSFOCUS Technologies Group DOI | ||
15:50 20mTalk | Your “Notice” Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking ISSTA Technical Papers Kaifeng Huang Tongji University, Yingfeng Xia Fudan University, Bihuan Chen Fudan University, Siyang He Fudan University, Huazheng Zeng Fudan University, Zhuotong Zhou Fudan University, Jin Guo Fudan University, Xin Peng Fudan University DOI | ||
16:10 20mTalk | DeLink: Source File Information Recovery in Binaries ISSTA Technical Papers Zhe Lang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Xiaohui Chen China Mobile Research Institute, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhanwei Song Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI |
15:30 - 17:30 | |||
15:30 30mTalk | Disjoint Polymorphism with Intersection and Union Types FTfJP | ||
16:00 30mTalk | Coeffects for MiniJava: Cf-Mj FTfJP | ||
16:30 30mTalk | Dafny vs. Dala: Experience with Mechanising Language Design FTfJP James Noble Independent. Wellington, NZ, Julian Mackay Victoria University of Wellington, Tobias Wrigstad Uppsala University, Andrew Fawcett Victoria University of Wellington, Michael Homer Victoria University of Wellington File Attached | ||
17:00 30mTalk | Incrementalizing Polynomial Functors FTfJP Timon Böhler Technical University of Darmstadt, David Richter Technical University of Darmstadt, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE |
15:30 - 17:00 | |||
15:30 90mPanel | Discussion Round PLF Ragnar Mogk Technische Universität Darmstadt |
15:30 - 16:30 | |||
15:30 - 16:30 | |||
15:30 20mTalk | FDI: Attack Neural Code Generation Systems through User Feedback Channel ISSTA Technical Papers Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Xiapu Luo Hong Kong Polytechnic University, Fu Song Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Nanjing Institute of Software Technology, David Lo Singapore Management University, Li Li Beihang University DOI | ||
15:50 20mTalk | CoderUJB: An Executable and Unified Java Benchmark for Practical Programming Scenarios ISSTA Technical Papers Zhengran Zeng Peking University, Yidong Wang Peking University, Rui Xie Peking University, Wei Ye Peking University, Shikun Zhang Peking University DOI | ||
16:10 20mTalk | CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision ISSTA Technical Papers Hao Wang Tsinghua University, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Zihan Sha Information Engineering University, Mingyang Sun University of Electronic Science and Technology of China, Yuchen Zhou Beijing University of Technology, Wenyu Zhu Tsinghua University, Wenju Sun Tsinghua University, Han Qiu Tsinghua University, Xi Xiao Tsinghua University DOI |
15:30 - 16:30 | Builds and TestingISSTA Technical Papers at EI 9 Hlawka Chair(s): Zeyu Sun Institute of Software at Chinese Academy of Sciences | ||
15:30 20mTalk | Enhancing Multi-agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation ISSTA Technical Papers Xuyan Ma Institute of Software at Chinese Academy of Sciences, Yawen Wang Institute of Software at Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences, Xiaofei Xie Singapore Management University, Boyu Wu Institute of Software at Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences, Fanjiang Xu Institute of Software at Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences DOI | ||
15:50 20mTalk | Commit Artifact Preserving Build Prediction ISSTA Technical Papers Guoqing Wang Peking University, Zeyu Sun Institute of Software at Chinese Academy of Sciences, Yizhou Chen Peking University, Yifan Zhao Peking University, Qingyuan Liang Peking University, Dan Hao Peking University DOI | ||
16:10 20mTalk | Detecting Build Dependency Errors in Incremental Builds ISSTA Technical Papers Jun Lyu Nanjing University, Shanshan Li Nanjing University, He Zhang Nanjing University, Yang Zhang Nanjing University, Guoping Rong Nanjing University, Manuel Rigger National University of Singapore DOI |
16:30 - 17:00 | ISSTA 2025 Preview and ClosingISSTA Keynotes at EI 7 Chair(s): Maria Christakis TU Wien, Michael Pradel University of Stuttgart | ||