ISSTA/ECOOP 2024 (series) /
ISSTA/ECOOP 2024 Program
Filter Program
Dates
Rooms
Tracks
Badges
Your Program
This program is tentative and subject to change.
Mon 16 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Mon 16 Sep
Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:00 - 10:30 | |||
10:30 - 12:00 | |||
10:30 30mDay opening | Opening remarks PLAID Carla Ferreira NOVA University Lisbon | ||
11:00 30mKeynote | Keynote talk PLAID | ||
11:30 30mTalk | CAUSALDOT: Causally Consistent Transactions with Non-blocking Reads and Deterministic Ordering PLAID Ruijie Gong The University of Hong Kong, Hong Kong, Haoze Song The University of Hong Kong, Hong Kong, Heming Cui University of Hong Kong |
12:00 - 13:30 | |||
13:30 - 15:00 | |||
13:30 30mTalk | Local Projections of DCR Choreographies with Data and Spawn PLAID Eduardo Geraldo , Bruno Braga NOVA University Lisbon, Nuno Fernandes NOVA University Lisbon, Diogo Ye NOVA University Lisbon, João Costa Seco NOVA-LINCS; Nova University of Lisbon | ||
14:00 30mTalk | Compositional Verification of Swarm Protocols PLAID Florian Furbach Technical University of Denmark, Alceste Scalas Technical University of Denmark, Roland Kuhn Actyx AG, Emilio Tuosto Gran Sasso Science Institute, L'Aquila, Italy | ||
14:30 30mTalk | Library Based Choreographies in Lean PLAID Simon Daniel TU Darmstadt, David Richter Technical University of Darmstadt, Mira Mezini TU Darmstadt |
15:00 - 15:30 | |||
15:30 - 17:00 | |||
15:30 30mTalk | Modal Crash Types for Intermittent Computing PLAID Myra Dotzel Carnegie Mellon University, Farzaneh Derakhshan Illinois Institute of Technology, Milijana Surbatovich University of Maryland, Limin Jia Carnegie Mellon University | ||
16:00 30mTalk | Less is More Revisited: Global Specification and Local Verification Approaches PLAID Nobuko Yoshida University of Oxford, UK, Ping Hou University of Oxford, Iona Kuhn University of Oxford | ||
16:30 30mTalk | Fair Join Pattern Matching for Actors PLAID Philipp Haller KTH Royal Institute of Technology, Ayman Hussein Technical University of Denmark, Hernan Melgratti University of Buenos Aires, Argentina, Alceste Scalas Technical University of Denmark, Emilio Tuosto Gran Sasso Science Institute, L'Aquila, Italy |
17:00 - 19:00 | |||
Tue 17 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Tue 17 Sep
Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:50 - 10:00 | MET2024 Opening and Keynote TalkMET at EI 9 Hlawka Chair(s): Huai Liu Swinburne University of Technology | ||
08:50 10mDay opening | Opening remarks MET Huai Liu Swinburne University of Technology | ||
09:00 60mKeynote | Keynote talk MET Arnaud Gotlieb Simula Research Laboratory |
10:00 - 10:30 | |||
10:30 - 12:00 | |||
10:30 15mPanel | Introduction to the Gamify 2024 workshop Gamify Riccardo Coppola Politecnico di Torino, Luca Ardito Politecnico di Torino, Maurizio Leotta DIBRIS, University of Genova, Italy, Gordon Fraser University of Passau | ||
10:45 45mKeynote | Bug-Hunting Games to Assist Software Development and Testing Education Gamify | ||
11:30 30mPaper | ScoutDroid: A Tool For Mobile Augmented Testing With Live Feedback Gamify A: Lorenzo Laudadio , A: Riccardo Coppola Politecnico di Torino, A: Marco Torchiano Politecnico di Torino, A: Stevan Tomic |
10:30 - 12:00 | MET2024 Session 1: Applications of Metamorphic TestingMET at EI 9 Hlawka Chair(s): Kun Qiu Hefei University of Technology | ||
10:30 30mPaper | Metamorphic Testing of a Steer-by-Wire System: An Intercultural Students-as-Partners Collaboration Experience MET Yifan Zhang University of Nottingham Ningbo China, Dave Towey University of Nottingham Ningbo China, Matthew pike University of Nottingham, Ningbo, China, Rui Qiu , Axel Tan Jaya , Sze Huey , Xinyi Zhang , Yuan Wu | ||
11:00 30mPaper | Metamorphic Testing of Image Processing Applications: A General Framework and Optimization Strategies MET Chang-ai Sun University of Science and Technology Beijing, Jiayu Xing , Xiaobei Li , Xiao-Yi Zhang University of Science and Technology Beijing, An Fu University of Science and Technology Beijing | ||
11:30 30mPaper | Evaluating Human Trajectory Prediction with Metamorphic Testing MET Helge Spieker Simula Research Laboratory, Norway, Nassim Belmecheri , Arnaud Gotlieb Simula Research Laboratory, Nadjib Lazaar |
12:00 - 13:30 | |||
13:30 - 15:00 | Gamify 2024 session 2Gamify at EI 10 Fritz Paschke Chair(s): Maurizio Leotta DIBRIS, University of Genova, Italy | ||
13:30 30mPaper | Test Smells Learning by a Gamification Approach Gamify A: Anna Rita Fasolino Federico II University of Naples, A: Porfirio Tramontana Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Italy | ||
14:00 30mPaper | Enlisting Students in Gamifying Software Testing Education: Results and Key Insights Gamify | ||
14:30 30mPaper | Engaging Developers in Exploratory Unit Testing through Gamification Gamify |
13:30 - 15:00 | MET2024 Session 2: Future Research of MTMET at EI 9 Hlawka Chair(s): Aitor Arrieta Mondragon University | ||
13:30 30mPaper | Using Category Partition to Detect Metamorphic Relations MET | ||
14:00 60mPanel | Interactive discussion: Key areas for MT’s research MET |
15:00 - 15:30 | |||
15:30 - 17:00 | |||
15:30 30mPaper | Testing Robot Challenge: a Serious Game for Testing Learning Gamify A: Anna Rita Fasolino Federico II University of Naples, A: Caterina Maria Accetto , A: Porfirio Tramontana University of Naples Federico II | ||
16:00 30mPaper | A Gaming Quest to Improve Web Locators Robustness Gamify A: Diego Clerissi DIBRIS, University of Genova, Italy, A: Maurizio Leotta DIBRIS, University of Genova, Italy, A: Filippo Ricca DIBRIS, University of Genova, Italy | ||
16:30 30mTalk | Panel: upcoming challenges for Gamification in Software Engineering Gamify |
15:30 - 17:00 | |||
15:30 30mPaper | Using Metamorphic Relations to Improve Accuracy and Robustness of Deep Neural Networks MET Kun Qiu Hefei University of Technology, Yu Zhou , Pak-Lok Poon School of Engineering & Technology, Central Queensland University, Australia | ||
16:00 60mPanel | Panel discussion: MT4AI & AI4MT MET |
18:00 - 20:00 | |||
Wed 18 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Wed 18 Sep
Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:00 - 08:30 | |||
08:30 - 09:00 | Opening and AwardsISSTA Keynotes at EI 7 Chair(s): Maria Christakis TU Wien, Michael Pradel University of Stuttgart | ||
09:00 - 10:00 | |||
09:00 60mKeynote | Software Quality Assurance in the Era of Large Language Models ISSTA Keynotes |
10:00 - 10:30 | |||
10:30 - 11:50 | |||
10:30 20mTalk | Large Language Models for Equivalent Mutant Detection: How Far are We? ISSTA Technical Papers Zhao Tian Tianjin University, Honglin Shu Kyushu University, Dong Wang Tianjin University, China, Xuejie Cao College of Intelligence and Computing, Tianjin University, Yasutaka Kamei Kyushu University, Junjie Chen Tianjin University DOI Pre-print | ||
10:50 20mTalk | An Empirical Examination of Fuzzer Mutator Performance ISSTA Technical Papers James Kukucka George Mason University, Luís Pina University of Illinois at Chicago, Paul Ammann George Mason University, USA, Jonathan Bell Northeastern University | ||
11:10 20mTalk | Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java Programs ISSTA Technical Papers Benjamin Kushigian University of Washington, Samuel Kaufman University of Washington, Ryan Featherman University of Washington, Hannah Potter University of Washington, Ardi Madadi University of Washington, René Just University of Washington | ||
11:30 20mTalk | LPR: Large Language Models-Aided Program Reduction ISSTA Technical Papers Mengxiao Zhang University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology, Zhenyang Xu University of Waterloo, Yiwen Dong University of Waterloo, Shin Hwei Tan Concordia University, Chengnian Sun University of Waterloo DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Toward the Automated Localization of Buggy Mobile App UIs from Bug Descriptions ISSTA Technical Papers Antu Saha William & Mary, Yang Song College of William and Mary, Junayed Mahmud University of Central Florida, Ying Zhou George Mason University, USA, Kevin Moran University of Central Florida, Oscar Chaparro William & Mary | ||
10:50 20mTalk | Reproducing Timing-dependent GUI Flaky Tests in Android Apps via A Single Event Delay ISSTA Technical Papers Xiaobao Cai Fudan University, Zhen Dong Fudan University, China, Yongjiang Wang Fudan University, Abhishek Tiwari Software Institute - USI, Lugano, Switzerland, Xin Peng Fudan University | ||
11:10 20mTalk | Semantic Constraint Inference for Web Form Test Generation ISSTA Technical Papers Parsa Alian University of British Columbia, Noor Nashid University of British Columbia, Mobina Shahbandeh University of British Columbia, Ali Mesbah The University of British Columbia | ||
11:30 20mTalk | Guardian: A Runtime Framework for LLM-based UI Exploration ISSTA Technical Papers Dezhi Ran Peking University, Hao Wang Peking University, China, Zihe Song University of Texas at Dallas, Mengzhou Wu Peking University, Yuan Cao Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Tao Xie Peking University |
10:30 - 11:50 | |||
10:30 20mTalk | AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation ISSTA Technical Papers Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Australia, Zhou Yang Singapore Management University, Li Li Beihang University, David Lo Singapore Management University Pre-print | ||
10:50 20mTalk | When to Stop? Towards Efficient Code Generation in LLMs with Excess Token Prevention ISSTA Technical Papers Lianghong Guo Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Ensheng Shi Xi’an Jiaotong University, Wanjun Zhong Sun Yat-sen University, Hongyu Zhang Chongqing University, Jiachi Chen Sun Yat-sen University, Ruikai Zhang Huawei Cloud Computing Technologies Co., Ltd., Yuchi Ma Huawei Cloud Computing Technologies CO., LTD., Zibin Zheng Sun Yat-sen University | ||
11:10 20mTalk | FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion ISSTA Technical Papers Qi Guo Tianjin University, China, Xiaohong Li Tianjin University, Xiaofei Xie Singapore Management University, Shangqing Liu Nanyang Technological University, Ze Tang Nanjing University, Ruitao Feng Singapore Management University, Junjie Wang Tianjin University, Jidong Ge Nanjing University, Lei Bu Nanjing University DOI | ||
11:30 20mTalk | Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks ISSTA Technical Papers Yuxin Qiu University of California, Riverside, Jie Hu University of California Riverside, Qian Zhang University of California, Riverside, Heng Yin University of California, Riverside |
10:30 - 11:50 | |||
10:30 20mTalk | Policy Testing with MDPFuzz (Replicability Study) ISSTA Technical Papers Quentin Mazouni Simula Research Laboratory, Helge Spieker Simula Research Laboratory, Norway, Arnaud Gotlieb Simula Research Laboratory, Mathieu Acher University of Rennes, France / Inria, France / CNRS, France / IRISA, France | ||
10:50 20mTalk | Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-based Mutation ISSTA Technical Papers | ||
11:10 20mTalk | Enhancing ROS System Fuzzing through Callback Tracing ISSTA Technical Papers Yuheng Shen Tsinghua University, Jianzhong Liu ShanghaiTech University, Yiru Xu Tsinghua University, Hao Sun ETH Zurich, Mingzhe Wang Tsinghua University, Heyuan Shi Central South University, Nan Guan City University of Hong Kong, Yu Jiang Tsinghua University DOI | ||
11:30 20mTalk | Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC ISSTA Technical Papers Haolai Wei Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Liwei Chen Institute of Information Engineering, Chinese Academy of Sciences, Zhijie Zhang Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Gang Shi Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Dan Meng Institute of Information Engineering, Chinese Academy of Sciences |
12:00 - 13:30 | |||
13:30 - 14:50 | |||
13:30 20mTalk | UPBEAT: Test Input Checks of Q# Quantum Libraries ISSTA Technical Papers Tianmin Hu Northwest University, Guixin Ye Northwest University, Zhanyong Tang Northwest University, Shin Hwei Tan Concordia University, Huanting Wang University of Leeds, UK, Meng Li Hefei University of Technology, Zheng Wang University of Leeds DOI | ||
13:50 20mTalk | Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement ISSTA Technical Papers Gwihwan Go Tsinghua University, Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Xiazijian Zou Central South University, Heyuan Shi Central South University, Yu Jiang Tsinghua University | ||
14:10 20mTalk | AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference ISSTA Technical Papers Hyungseok Kim The Affiliated Institute of ETRI, Soomin Kim KAIST, Jungwoo Lee KAIST, Sang Kil Cha KAIST | ||
14:30 20mTalk | Ma11y: A Mutation Framework for Web Accessibility Testing ISSTA Technical Papers Mahan Tafreshipour University of California, Irvine, Anmol Vilas Deshpande University of California at Irvine, Forough Mehralian University of California at Irvine, Iftekhar Ahmed University of California, Irvine, Sam Malek University of California at Irvine DOI |
13:30 - 14:50 | |||
13:30 20mTalk | Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph ISSTA Technical Papers Xiaoyong Yan Zhejiang University, Biao He Ant Group, Wenbo Shen Zhejing University, Yu Ouyang Ant Group, Kaihang Zhou Zhejiang University, Xingjian Zhang Zhejiang University, Xingyu Wang Zhejiang University, Yukai Cao Zhejiang University, Rui Chang Zhejiang University | ||
13:50 20mTalk | SCALE: Constructing Symbolic Comment Trees for Software Vulnerability Detection ISSTA Technical Papers Xin-Cheng Wen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shuzheng Gao The Chinese University of Hong Kong, Yang Xiao Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Michael Lyu Chinese University of Hong Kong DOI | ||
14:10 20mTalk | CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection ISSTA Technical Papers Hao Wang Tsinghua University, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Mingyang Sun University of Electronic Science and Technology of China, Yuchen Zhou Beijing University of Technology, Han Qiu Tsinghua University, Xi Xiao Tsinghua Shenzhen International Graduate School, Tsinghua University DOI | ||
14:30 20mTalk | Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation ISSTA Technical Papers Zhaoyang Chu Huazhong University of Science and Technology, Yao Wan Huazhong University of Science and Technology, Qian Li Curtin University, Yang Wu Huazhong University of Science and Technology, Hongyu Zhang Chongqing University, Yulei Sui UNSW, Guandong Xu University of Technology Sydney, Hai Jin Huazhong University of Science and Technology DOI Pre-print |
13:30 - 15:00 | |||
13:30 12mTalk | Generalized Concurrency Testing Tool for Distributed Systems Tool Demonstrations Ege Berkay Gulcan Delft University of Technology, João Neto Delft University of Technology, Burcu Kulahcioglu Ozkan Delft University of Technology | ||
13:42 12mTalk | Testing concurrent algorithms on JVM with Lincheck and IntelliJ IDEA Tool Demonstrations Alexander Potapov JetBrains, Maksim Zuev JetBrains, Evgenii Moiseenko JetBrains Research, Nikita Koval JetBrains | ||
13:55 12mTalk | JCWIT: A Correctness-Witness Validator for Java Programs based on Bounded Model Checking Tool Demonstrations Zaiyu Cheng University of Manchester, Tong Wu University of Manchester, Peter Schrammel University of Sussex and Diffblue Ltd, Norbert Tihanyi Eotvos Lorand University, Eddie B. de Lima Filho TPV Technology, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil | ||
14:08 12mTalk | ESBMC-Python: A Bounded Model Checker for Python Programs Tool Demonstrations Bruno Farias University of Manchester, Rafael Menezes University of Manchester, Eddie B. de Lima Filho TPV Technology, Youcheng Sun The University of Manchester, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil | ||
14:21 12mTalk | Panda: A Concurrent Scheduler for Compiler-Based Tools Tool Demonstrations Xutong Ma Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jun Yan Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI Pre-print Media Attached | ||
14:34 12mTalk | SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries Tool Demonstrations Ningyu He Peking University, Zhehao Zhao Peking University, Hanqin Guan Peking University, Jikai Wang Huazhong University of Science and Technology, Shreya Mathews IMC University of Applied Sciences Krems, Ding Li Peking University, Haoyu Wang Huazhong University of Science and Technology, Xiangqun Chen Peking University, Yao Guo Peking University | ||
14:47 12mTalk | PolyTracker: Whole-Input Dynamic Information Flow Tracing Tool Demonstrations Evan Sultanik Trail of Bits, Marek Surovič Trail of Bits, Henrik Brodin Trail of Bits, Kelly Kaoudis Trail of Bits, Facundo Tuesca Trail of Bits, Carson Harmon Trail of Bits, Lisa Overall Trail of Bits, Joseph Sweeney Trail of Bits, Bradford Larsen Trail of Bits |
13:30 - 14:50 | |||
13:30 20mTalk | NeuFair: Neural Network Fairness Repair with Dropout ISSTA Technical Papers Vishnu Asutosh Dasu Pennsylvania State University, Ashish Kumar , Saeid Tizpaz-Niari University of Texas at El Paso, Gang Tan Pennsylvania State University | ||
13:50 20mTalk | A Large-Scale Empirical Study on Improving the Fairness of Image Classification Models ISSTA Technical Papers Junjie Yang College of Intelligence and Computing, Tianjin University, Jiajun Jiang Tianjin University, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Junjie Chen Tianjin University DOI | ||
14:10 20mTalk | Efficient DNN-Powered Software with Fair Sparse Models ISSTA Technical Papers Xuanqi Gao Xi’an Jiaotong University, Weipeng Jiang Xi'an Jiaotong University, Juan Zhai University of Massachusetts, Amherst, Shiqing Ma University of Massachusetts, Amherst, Xiaoyu Zhang Xi'an Jiaotong University, Chao Shen Xi'an Jiaotong University Pre-print | ||
14:30 20mTalk | Synthesizing Boxes Preconditions for Deep Neural Networks ISSTA Technical Papers Zengyu Liu College of Computer Science and Technology, National University of Defense Technology, Changsha 410073, China, Liqian Chen National University of Defense Technology, China, Wanwei Liu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China |
13:30 - 14:50 | |||
13:30 20mTalk | LLM4Fin: Fully Automating LLM-Powered Test Case Generation for FinTech Software Acceptance Testing ISSTA Technical Papers Zhiyi Xue East China Normal University, Liangguo East China Normal University, Senyue Tian East China Normal University, Xiaohong Chen ECNU, Pingping Li Guotai Junan Securities Co., Ltd, Liangyu Chen East China Normal University, Tingting Jiang Guotai Junan Securities Co., Ltd, Min Zhang East China Normal University | ||
13:50 20mTalk | Domain Adaptation for Code Model-based Unit Test Case Generation ISSTA Technical Papers Jiho Shin York University, Sepehr Hashtroudi , Hadi Hemmati York University, Song Wang York University | ||
14:10 20mTalk | Practitioners’ Expectations on Automated Test Generation ISSTA Technical Papers | ||
14:30 20mTalk | UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing ISSTA Technical Papers Yifeng He University of California, Davis, Jiabo Huang Tencent, Yuyang Rong University of California, Davis, Yiwen Guo Unaffiliated, Ethan Wang University of California, Davis, Hao Chen University of California, Davis |
15:00 - 15:30 | |||
15:30 - 16:50 | |||
15:30 20mTalk | Bugs in Pods: Understanding Bugs in Container Runtime Systems ISSTA Technical Papers Jiongchi Yu Singapore Management University, Xiaofei Xie Singapore Management University, Cen Zhang Nanyang Technological University, Sen Chen Tianjin University, Yuekang Li The University of New South Wales, Wenbo Shen Zhejing University | ||
15:50 20mTalk | An Empirical Study on Kubernetes Operator Bugs ISSTA Technical Papers Qingxin Xu Institute of Software, Chinese Academy of Sciences, China, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School | ||
16:10 20mTalk | Understanding Misconfigurations in ROS: An Empirical Study and Current Approaches ISSTA Technical Papers Paulo Canelas Carnegie Mellon University, Bradley Schmerl Carnegie Mellon University, USA, Alcides Fonseca University of Lisbon, Christopher Steven Timperley Carnegie Mellon University DOI Pre-print Media Attached | ||
16:30 20mTalk | An In-depth Study of Runtime Verification Overheads during Software Testing ISSTA Technical Papers |
15:30 - 17:10 | |||
15:30 20mTalk | Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace Checking ISSTA Technical Papers Weilin Luo Sun Yat-Sen University, Pingjia Liang Sun Yat-Sen University, Qiu Junming SUN YAT-SEN UNIVERSITY, Polong Chen Sun Yat-Sen University, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Weiyuan Fang SUN YAT-SEN UNIVERSITY | ||
15:50 20mTalk | Interprocedural Path Complexity Analysis ISSTA Technical Papers Mira Kaniyur Harvey Mudd College, Ana Cavalcante-Studart Harvey Mudd College, Yihan Yang Harvey Mudd College, Sangeon Park Harvey Mudd College, David Chen Harvey Mudd College, Duy Lam Harvey Mudd College, Lucas Bang Harvey Mudd College DOI | ||
16:10 20mTalk | VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information Extraction ISSTA Technical Papers Thanh-Dat Nguyen University of Melbourne, Tung Do-Viet Cinnamon AI, Hung Nguyen-Duy Independent Researcher, Tuan-Hai Luu Cinnamon AI, Hung Le Deakin University, Xuan-Bach D. Le University of Melbourne, Patanamon Thongtanunam University of Melbourne Pre-print | ||
16:30 20mTalk | Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks ISSTA Technical Papers Huaien Zhang The Hong Kong Polytechnic University, Southern University of Science and Technology, Yu Pei The Hong Kong Polytechnic University, Shuyun Liang Southern University of Science and Technology, Zezhong Xing Southern University of Science and Technology, Shin Hwei Tan Concordia University | ||
16:50 20mTalk | API Misuse Detection via Probabilistic Graphical Model ISSTA Technical Papers Yunlong Ma Beihang University, Wentong Tian Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University, Li Li Beihang University DOI |
15:30 - 17:00 | |||
15:30 12mTalk | SMBugFinder: An Automated Framework for Testing Protocol Implementations for State Machine Bugs Tool Demonstrations Paul Fiterau-Brostean Uppsala University, Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens, Fredrik Tåquist Uppsala University, Bengt Jonsson Uppsala University, Sweden | ||
15:42 12mTalk | FRAFOL: FRAmework FOr Learning mutation testing Tool Demonstrations Pedro Tavares Faculty of Engineering, University of Porto, Ana Paiva INESC TEC, Faculty of Engineering, University of Porto, Domenico Amalfitano University of Naples Federico II, René Just University of Washington | ||
15:55 12mTalk | FixCheck: A Tool for Improving Patch Correctness Analysis Tool Demonstrations Facundo Molina IMDEA Software Institute, Juan Manuel Copia IMDEA Software Institute; Universidad Politécnica de Madrid, Alessandra Gorla IMDEA Software Institute | ||
16:08 12mTalk | HECS: A Hypergraph Learning-based System for Detecting Extract Class Refactoring Opportunities Tool Demonstrations Luqiao Wang Xidian University, Qiangqiang Wang Xidian University, Jiaqi Wang Xidian University, Yutong Zhao University of Central Missouri, USA, Minjie Wei Xidian University, Zhou Quan Xidian University, Di Cui , Qingshan Li Xidian University | ||
16:21 12mTalk | DMMPP: Constructing Dummy Main Methods for Android Apps with Path-sensitive Predicates Tool Demonstrations Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
16:34 12mTalk | FunRedisp: A Function Redispatch Tool to Reduce Invocation Gas Fees in Solidity Smart Contracts Tool Demonstrations | ||
16:47 12mTalk | The Flexcrash Platform for Testing Autonomous Vehicles in Mixed-Traffic Scenarios Tool Demonstrations Alessio Gambi Austrian Institute of Technology (AIT), Shreya Mathews IMC University of Applied Sciences Krems, Shreya Mathews IMC University of Applied Sciences Krems, Shreya Mathews IMC University of Applied Sciences Krems, Shreya Mathews IMC University of Applied Sciences Krems |
15:30 - 17:10 | |||
15:30 20mTalk | Automated Program Repair via Conversation: Fixing 162 out of 337 bugs for $0.42 each using ChatGPT ISSTA Technical Papers Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois Urbana-Champaign | ||
15:50 20mTalk | ThinkRepair: Self-Directed Automated Program Repair ISSTA Technical Papers Xin Yin The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Chao Ni School of Software Technology, Zhejiang University, Shaohua Wang Central University of Finance and Economics, Zhenhao Li York University, Limin Zeng School of Software Technology, Zhejiang University, Xiaohu Yang Zhejiang University | ||
16:10 20mTalk | BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming Assignments ISSTA Technical Papers Linna Xie Nanjing University, Chongmin Li Nanjing University, Yu Pei The Hong Kong Polytechnic University, Tian Zhang Nanjing University, Minxue Pan Nanjing University | ||
16:30 20mTalk | CREF: An LLM-based Conversational Software Repair Framework for Programming Tutors ISSTA Technical Papers Boyang Yang Yanshan University & Jisuanke Co. Ltd., Haoye Tian University of Melbourne, Weiguo PIAN University of Luxembourg, Haoran Yu Jisuanke Co. Ltd., Haitao Wang Jisuanke Co. Ltd., Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Shunfu Jin Yanshan University | ||
16:50 20mTalk | One Size Does Not Fit All: Multi-Granularity Patch Generation for Better Automated Program Repair ISSTA Technical Papers Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Ming Wen Huazhong University of Science and Technology, Liqian Chen National University of Defense Technology, China, Xiaoguang Mao National University of Defense Technology Pre-print |
15:30 - 17:10 | |||
15:30 20mTalk | Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters ISSTA Technical Papers Purvish Jajal Purdue University, Wenxin Jiang Purdue University, Arav Tewari Purdue University, Erik Kocinare Purdue University, Joseph Woo Purdue University, Anusha Sarraf Purdue University, Yung-Hsiang Lu Purdue University, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory, James C. Davis Purdue University Pre-print | ||
15:50 20mTalk | Interpretability based Neural Network Repair ISSTA Technical Papers Zuohui Chen Zhejiang University of Technology, Jun Zhou Zhejiang University of Technology, Youcheng Sun The University of Manchester, Jingyi Wang Zhejiang University, Qi Xuan Zhejiang University of Technology, Xiaoniu Yang Zhejiang University of Technology | ||
16:10 20mTalk | See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing ISSTA Technical Papers Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang The Hong Kong University of Science and Technology, Zhendong Su ETH Zurich | ||
16:30 20mTalk | Isolation-Based Debugging for Neural Networks ISSTA Technical Papers Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Youcheng Sun The University of Manchester, Peng Cheng Zhejiang University, Jiming Chen Zhejiang University DOI | ||
16:50 20mTalk | Certified Continual Learning for Neural Network Regression ISSTA Technical Papers Long Pham Hong Singapore Management University, Jun Sun School of Information Systems, Singapore Management University, Singapore |
17:45 - 23:00 | |||
Thu 19 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Thu 19 Sep
Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 09:00 | |||
09:00 - 10:00 | |||
09:00 60mKeynote | Can WebAssembly Be Software’s Final Substrate? MPLR Ben L. Titzer Carnegie Mellon University |
09:00 - 10:00 | |||
09:00 60mKeynote | Runtime Invariant Checking in Robotic Systems and Deep Learning Models VORTEX |
09:00 - 10:00 | |||
09:00 60mKeynote | The Overlooked Steps in Program Analysis: Designing by People for People ISSTA Keynotes |
10:00 - 10:30 | |||
10:30 - 11:30 | |||
10:30 60mKeynote | Advanced Debugging Techniques In Practice DEBT Robert O'Callahan Google |
10:30 - 11:50 | |||
10:30 20mResearch paper | A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We? ISSTA Technical Papers Zhihan Jiang The Chinese University of Hong Kong, Jinyang Liu The Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Yintong Huo The Chinese University of Hong Kong, Jiazhen Gu The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Jieming Zhu Huawei Noah's Ark Lab, Michael Lyu Chinese University of Hong Kong DOI Pre-print | ||
10:50 20mTalk | FastLog: An End-to-End Method to Efficiently Generate and Insert Logging Statements ISSTA Technical Papers Xiaoyuan Xie School of Computer Science, Wuhan University, China, Zhipeng Cai School of Computer Science, Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Jifeng Xuan Wuhan University DOI | ||
11:10 20mTalk | Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs ISSTA Technical Papers Shiwen Shan Sun Yat-sen University, Yintong Huo The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Yichen LI The Chinese University of Hong Kong, Dan Li Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
11:30 20mTalk | Foliage: Nourishing Evolving Software by Characterizing and Clustering Field Bugs ISSTA Technical Papers Zhanyao Lei Shanghai Jiao Tong University, Yixiong Chen Shanghai Jiao Tong University, Mingyuan Xia AppetizerIO, Zhengwei Qi Shanghai Jiao Tong University DOI |
10:30 - 11:50 | |||
10:30 26mTalk | Lazy Sparse Conditional Constant Propagation in the Sea of Nodes MPLR DOI | ||
10:56 26mTalk | Mutator-Driven Object Placement using Load Barriers MPLR Jonas Norlinder Uppsala University, Albert Mingkun Yang Oracle, David Black-Schaffer Uppsala University, Tobias Wrigstad Uppsala University DOI | ||
11:23 26mTalk | Interactive Programming for Microcontrollers by Offloading Dynamic Incremental Compilation MPLR Fumika Mochizuki University of Tokyo, Tetsuro Yamazaki University of Tokyo, Shigeru Chiba University of Tokyo DOI |
10:30 - 11:50 | |||
10:30 20mTalk | DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3 ISSTA Technical Papers Zhiying Wu Sun Yat-sen University, Jiajing Wu Sun Yat-sen University, Hui Zhang Sun Yat-sen University, Ziwei Li Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Qing Xia Institute of Software at Chinese Academy of Sciences, Gang Fan n, n, Yi Zhen n.n. DOI | ||
10:50 20mTalk | LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts ISSTA Technical Papers Peilin Zheng Sun Yat-sen University, Bowei Su Sun Yat-sen University, Xiapu Luo The Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China, Neng Zhang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University | ||
11:10 20mTalk | Following the "Thread": Toward Finding Manipulatable Bottlenecks In Blockchain Clients ISSTA Technical Papers Shuohan Wu Hong Kong Polytechnic University, zihao li The Hong Kong Polytechnic Universituy, Hao Zhou Hong Kong Polytechnic University, Xiapu Luo The Hong Kong Polytechnic University, Jianfeng Li Xi'an Jiaotong University, Haoyu Wang Huazhong University of Science and Technology | ||
11:30 20mTalk | DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications ISSTA Technical Papers Maoyi Xie Nanyang Technological University, Ming Hu Singapore Management University, Ziqiao Kong Nanyang Technological University, Cen Zhang Nanyang Technological University, Yebo Feng Nanyang Technological University, Haijun Wang Xi'an Jiaotong University, YUE XUE MetaTrust Labs, Hao Zhang MetaTrust Labs, Ye Liu Nanyang Technological University, Yang Liu Nanyang Technological University DOI |
10:30 - 12:00 | |||
10:30 30mTalk | Runtime Verified Neural Networks for Cyber-Physical Systems VORTEX Dhiren Tripuramallu , Anand Raghunathan School of Electrical and Computer Engineering, Purdue University, Srinivas Pinisetty Indian Institute of Technology Bhubaneswar, Hammond Pearce University of New South Wales, Sydney, Partha Roop University of Auckland | ||
11:00 30mTalk | Optimising Aggregate Monitors for Spatial Logic of Closure Spaces Properties VORTEX Gianluca Aguzzi Alma Mater Studiorum - Università di Bologna, Giorgio Audrito Università di Torino, Mirko Viroli Alma Mater Studiorum - Università di Bologna | ||
11:30 30mTalk | Real-Time Guarantees for SLCS Monitors in XC VORTEX |
10:30 - 12:00 | |||
10:30 - 11:50 | |||
10:30 20mTalk | Automating Zero-Shot Patch Porting for Hard Forks ISSTA Technical Papers Shengyi Pan Zhejiang University, You Wang Zhejiang University, Zhongxin Liu Zhejiang University, Xing Hu Zhejiang University, Xin Xia Huawei Technologies, Shanping Li Zhejiang University DOI Pre-print | ||
10:50 20mTalk | Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial Bugs ISSTA Technical Papers Yicheng Ouyang University of Illinois at Urbana-Champaign, Jun Yang UIUC, Lingming Zhang University of Illinois Urbana-Champaign DOI | ||
11:10 20mTalk | Neurosymbolic Repair of Test Flakiness ISSTA Technical Papers Yang Chen University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign | ||
11:30 20mTalk | AutoCodeRover: Autonomous Program Improvement ISSTA Technical Papers Yuntong Zhang National University of Singapore, Haifeng Ruan National University of Singapore, Zhiyu Fan National University of Singapore, Abhik Roychoudhury National University of Singapore |
10:30 - 11:50 | |||
10:30 20mTalk | Distance-Aware Test Input Selection for Deep Neural Networks ISSTA Technical Papers Zhong Li , Zhengfeng Xu Nanjing University, Ruihua Ji Nanjing University, Minxue Pan Nanjing University, Tian Zhang Nanjing University, Linzhang Wang Nanjing University, Xuandong Li Nanjing University DOI | ||
10:50 20mTalk | Test Selection for Deep Neural Networks using Meta-Models with Uncertainty Metrics ISSTA Technical Papers Demet Demir Department of Information Systems, Graduate School of Informatics, Middle East Technical University, Ankara, Türkiye, Aysu Betin Can Department of Information Systems, Graduate School of Informatics, Middle East Technical University, Ankara, Türkiye, Elif Surer Department of Modeling and Simulation, Graduate School of Informatics, Middle East Technical University, Ankara, Türkiye | ||
11:10 20mTalk | Datactive: Data Fault Localization for Object Detection Systems ISSTA Technical Papers Yining Yin Nanjing University, China, Yang Feng Nanjing University, Shihao Weng Nanjing University, Yuan Yao Nanjing University, Jia Liu Nanjing University, Zhihong Zhao | ||
11:30 20mTalk | TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development ISSTA Technical Papers Xiangshan Gao Zhejiang University and Huawei Technology, Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Jie Shi Huawei International, Peng Cheng Zhejiang University, Jiming Chen Zhejiang University |
11:30 - 12:00 | |||
11:30 30mTalk | In-field debugging of automotive microcontrollers for highest system availability DEBT Gasper Skvarc Bozic Infineon Technologies AG, Ibai Irigoyen Ceberio Infineon Technologies AG, Albrecht Mayer Infineon Technologies AG |
12:00 - 13:30 | |||
12:00 - 13:30 | |||
13:30 - 15:00 | |||
13:30 30mTalk | Bug localisation in Model-Based Testing Using Model-Centric Shrinking DEBT Susan van den Broek University of Amsterdam, Ana Oprescu University of Amsterdam, Theo C Ruys Axini B.V. | ||
14:00 30mTalk | A Reversible Debugger for MPI Applications DEBT Mihkel Tiks Tartu University, Ott-Kaarel Martens Tartu University, Eero Vainikko Tartu University, Stefan Kuhn Tartu University | ||
14:30 30mTalk | Language-Agnostic Debugging for Microcontrollers DEBT Carlos Rojas Castillo Vrije Universiteit Brussel, Matteo Marra Nokia Bell Labs, Belgium, Elisa Gonzalez Boix Vrije Universiteit Brussel |
13:30 - 14:50 | |||
13:30 20mTalk | Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment ISSTA Technical Papers Jiashui Wang Zhejiang University, Peng Qian Zhejiang University, Xilin Huang Ant Group, Xinlei Ying Ant Group, Yan Chen Zhejiang University, Shouling Ji Zhejiang University, Jianhai Chen Zhejiang University, China, Jundong XIe Ant Group, Long Liu Ant Group | ||
13:50 20mTalk | Multi-modal Learning for WebAssembly Reverse Engineering ISSTA Technical Papers DOI | ||
14:10 20mTalk | WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation ISSTA Technical Papers Shangtong Cao Beijing University of Posts and Telecommunications, Ningyu He Peking University, Xinyu She Huazhong University of Science and Technology, Yixuan Zhang Peking University, Mu Zhang University of Utah, Haoyu Wang Huazhong University of Science and Technology | ||
14:30 20mTalk | Wapplique: Testing WebAssembly Runtime via Execution Context-aware Bytecode Mutation ISSTA Technical Papers Wenxuan Zhao School of Computer Science, Fudan University, Ruiying Zeng Fudan University, Yangfan Zhou Fudan University |
13:30 - 14:50 | |||
13:30 20mTalk | mruby on Resource-Constrained Low-Power Coprocessors of Embedded Devices (Work in Progress) MPLR Go Suzuki Tokyo Institute of Technology, Takuo Watanabe Tokyo Institute of Technology, Sosuke Moriguchi Tokyo Institute of Technology DOI | ||
13:50 20mTalk | Imagine There’s No Source Code: Replay Diagnostic Location Information in Dynamic EDSL Meta-programming (Work in Progress) MPLR DOI | ||
14:10 20mTalk | Existential Containers in Scala MPLR DOI | ||
14:30 20mTalk | Quff: A Dynamically Typed Hybrid Quantum-Classical Programming Language MPLR Christopher John Wright University of Manchester, Pavlos Petoumenos University of Manchester, John Goodacre University of Manchester, Mikel Luján University of Manchester, UK DOI |
13:30 - 14:50 | |||
13:30 20mTalk | Testing Gremlin-Based Graph Database Systems via Query Disassembling ISSTA Technical Papers Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Jiansen Song Institute of Software Chinese Academy of Sciences, Liang Xu , Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences | ||
13:50 20mTalk | SQLess: Dialect-Agnostic SQL Query Simplification ISSTA Technical Papers Li Lin School of Informatics, Xiamen University, Zongyin Hao School of Informatics, Xiamen University, Chengpeng Wang The Hong Kong University of Science and Technology, Zhuangda Wang School of Informatics, Xiamen University, Rongxin Wu School of Informatics, Xiamen University, Gang Fan n, n | ||
14:10 20mTalk | Testing Graph Database Systems with Graph-State Persistence Oracle ISSTA Technical Papers Shuang Liu Renmin University of China, Junhao Lan Tianjin University, China, Xiaoning Du Monash University, Australia, Jiyuan Li Tianjin University, China, Wei Lu Renmin University of China, China, Jiajun Jiang Tianjin University, Xiaoyong Du Renmin University of China | ||
14:30 20mTalk | DBStorm: Generating Various Effective Workloads for Testing Isolation Levels ISSTA Technical Papers Keqiang Li East China Normal University, Siyang Weng East China Normal University, Lyu Ni East China Normal University, Chengcheng Yang East China Normal University, Rong Zhang East China Normal University, Xuan Zhou East China Normal University, Aoying Zhou East China Normal University |
13:30 - 14:30 | |||
13:30 60mKeynote | R2U2: Runtime Verification Takes Off! VORTEX |
13:30 - 15:00 | |||
13:30 30mTalk | First Experiments on Automated Execution of Gherkin Test Specifications with Collaborating LLM Agents A-TEST Severin Bergsmann Software Competence Center Hagenberg (SCCH), Alexander Schmidt Software Competence Center Hagenberg (SCCH), Stefan Fischer Software Competence Center Hagenberg, Rudolf Ramler Software Competence Center Hagenberg (SCCH) | ||
14:00 30mTalk | Use of ChatGPT as an Assistant in the End-to-End Test Script Generation for Android Apps A-TEST Boni Garcia Universidad Carlos III de Madrid, Maurizio Leotta DIBRIS, University of Genova, Italy, Filippo Ricca DIBRIS, Università di Genova, Jim Whitehead University of California, Santa Cruz | ||
14:30 30mTalk | GreeDDy: Accelerate Parallel DDMIN A-TEST Daniel Vince University of Szeged, Department of Software Engineering, Ákos Kiss University of Szeged, Hungary |
13:30 - 14:50 | |||
13:30 20mTalk | MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination Indexing ISSTA Technical Papers Tianyi Yang The Chinese University of Hong Kong, Cheryl Lee The Chinese University of Hong Kong, Jiacheng Shen The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Cong Feng Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Yongqiang Yang Huawei Technologies, Michael Lyu Chinese University of Hong Kong DOI | ||
13:50 20mTalk | Feedback-Directed Partial Execution ISSTA Technical Papers Ishrak Hayet North Carolina State University, Adam Scott North Carolina State University, Marcelo d'Amorim North Carolina State University | ||
14:10 20mTalk | Define-Use Guided Path Exploration for Better Forced Execution ISSTA Technical Papers Dongnan He Renmin University of China, Dongchen Xie Renmin University of China, Yujie Wang Renmin University of China, Wei You Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wenchang Shi Renmin University of China, China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI | ||
14:30 20mTalk | SelfPiCo: Self-Guided Partial Code Execution with LLMs ISSTA Technical Papers Zhipeng Xue , Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Shaohua Wang Central University of Finance and Economics, Xing Hu Zhejiang University, Xin Xia Huawei Technologies, Shanping Li Zhejiang University |
13:30 - 14:50 | |||
13:30 20mTalk | Precise Compositional Buffer Overflow Detection via Heap Disjointness ISSTA Technical Papers Yiyuan Guo The Hong Kong University of Science and Technology, Peisen Yao Zhejiang University, Charles Zhang The Hong Kong University of Science and Technology DOI Pre-print | ||
13:50 20mTalk | Finding Cuts in Static Analysis Graphs to Debloat Software ISSTA Technical Papers Christoph Blumschein Hasso Plattner Institute, University of Potsdam, Germany, Fabio Niephaus Oracle Labs, Potsdam, Codrut Stancu Oracle Labs, Christian Wimmer Oracle Labs, Jens Lincke University of Potsdam; Hasso Plattner Institute, Robert Hirschfeld University of Potsdam; Hasso Plattner Institute DOI Pre-print | ||
14:10 20mTalk | Scalable, Sound and Accurate Jump Table Analysis ISSTA Technical Papers Huan Nguyen Stony Brook University, Soumyakant Priyadarshan Stony Brook University, R. Sekar Stony Brook University | ||
14:30 20mTalk | Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT ISSTA Technical Papers Elvira Albert Complutense University of Madrid, Jesús Correas Complutense University of Madrid, Pablo Gordillo Universidad Complutense de Madrid, Guillermo Román-Díez Universidad Politécnica de Madrid, Albert Rubio Complutense University of Madrid |
14:30 - 15:00 | |||
14:30 30mTalk | RVsec: Towards a Comprehensive Technology Stack for Secure Deployment of Software Monitors VORTEX |
15:00 - 15:30 | |||
15:30 - 17:00 | |||
15:30 20mDemonstration | Concolic Multiverse Debugging DEBT Maarten Steevens Ghent University, Belgium, Tom Lauwaerts Universiteit Gent, Belgium, Christophe Scholliers Universiteit Gent, Belgium | ||
15:50 20mDemonstration | Reversible Debugging of Erlang Programs in CauDEr DEBT | ||
16:10 20mDemonstration | Abstract Debugging with GobPie DEBT Karoliine Holter University of Tartu, Estonia, Juhan Oskar Hennoste University of Tartu, Simmo Saan University of Tartu, Estonia, Patrick Lam University of Waterloo, Vesal Vojdani University of Tartu | ||
16:30 20mDemonstration | Localizer - a visual debugging assistant for Python programs DEBT Shehroz Khan Åbo Akademi University, Gaadha Sudheerbabu Åbo Akademi University, Dragos Truscan Åbo Akademi University, Tanwir Ahmad Åbo Akademi University | ||
16:50 10mDay closing | Closing by the workshop organizers DEBT |
15:30 - 17:10 | |||
15:30 20mTalk | Silent Taint-Style Vulnerability Fixes Identification ISSTA Technical Papers Zhongzhen Wen Nanjing University, Jiayuan Zhou Huawei, Minxue Pan Nanjing University, Shaohua Wang Central University of Finance and Economics, Xing Hu Zhejiang University, Tongtong Xu Huawei, Tian Zhang Nanjing University, Xuandong Li Nanjing University DOI | ||
15:50 20mTalk | FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor ISSTA Technical Papers Zhenyu Ye Hunan University, Lei Zhou National University of Defense Technology, Fengwei Zhang Southern University of Science and Technology, Wenqiang Jin Hunan University, Zhenyu Ning Hunan University; Southern University of Science and Technology, Yupeng Hu Hunan University, Zheng Qin Hunan University DOI | ||
16:10 20mTalk | Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset ISSTA Technical Papers Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
16:30 20mTalk | PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software ISSTA Technical Papers Kaixuan Li East China Normal University, Jian Zhang Nanyang Technological University, Sen Chen Tianjin University, Han Liu East China Normal University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University Pre-print | ||
16:50 20mTalk | An Empirical Study of Static Analysis Tools for Secure Code Review ISSTA Technical Papers Wachiraphan (Ping) Charoenwet The University of Melbourne, Patanamon Thongtanunam University of Melbourne, Thuan Pham The University of Melbourne, Christoph Treude Singapore Management University |
15:30 - 16:50 | |||
15:30 20mTalk | Towards Realistic Results for Instrumentation-Based Profilers for JIT-Compiled Systems (Work in Progress) MPLR Humphrey Burchell University of Kent, Octave Larose University of Kent, Stefan Marr University of Kent DOI Pre-print | ||
15:50 20mTalk | Toward Declarative Auditing of Java Software for Graceful Exception Handling (Work in Progress) MPLR DOI | ||
16:10 20mTalk | Dynamic Possible Source Count Analysis for Data Leakage Prevention MPLR Eri Ogawa University of Tokyo; IBM Research, Tetsuro Yamazaki University of Tokyo, Ryota Shioya University of Tokyo DOI | ||
16:30 20mTalk | The Cost of Profiling in the HotSpot Virtual Machine MPLR Rene Mueller Huawei Zurich Research Center, Switzerland, Maria Carpen-Amarie Huawei Zurich Research Center, Switzerland, Matvii Aslandukov Kharkiv National University of Radio Electronics, Konstantinos Tovletoglou Independent Researcher DOI |
15:30 - 16:30 | |||
15:30 20mTalk | Traceback: A Fault Localization Technique for Molecular Programs ISSTA Technical Papers Michael C. Gerten Iowa State University, James I. Lathrop Iowa State University, Myra Cohen Iowa State University DOI | ||
15:50 20mTalk | C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging ISSTA Technical Papers Xuezhi Song Fudan University, Yijian Wu Fudan University, Shuning Liu Fudan University, Bihuan Chen Fudan University, Yun Lin Shanghai Jiao Tong University, Xin Peng Fudan University DOI | ||
16:10 20mTalk | Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-call Bugs ISSTA Technical Papers Arooba Shahoor Kyungpook National University, Jooyong Yi UNIST, Dongsun Kim Korea University, South Korea |
15:30 - 16:30 | |||
15:30 60mKeynote | Operational and Declarative Runtime Verification and their Combination VORTEX Doron Peled Bar Ilan University, Klaus Havelund Jet Propulsion Laboratory, California Institute of Technology |
15:30 - 17:00 | |||
15:30 - 17:10 | |||
15:30 20mTalk | One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural Network ISSTA Technical Papers Di Cui , Qiangqiang Wang Xidian University, Yutong Zhao University of Central Missouri, USA, Jiaqi Wang Xidian University, Minjie Wei Xidian University, Jingzhao Hu Xidian University, Luqiao Wang Xidian University, Qingshan Li Xidian University | ||
15:50 20mTalk | CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature ISSTA Technical Papers Chenyan Liu Shanghai Jiao Tong University; National University of Singapore, Cai Yufan Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yuhuan Huang Shanghai Jiao Tong University, Yunrui Pei Shanghai Jiao Tong University, Bo Jiang Bytedance Network Technology, Ping Yang Bytedance Network Technology, Jin Song Dong National University of Singapore, Hong Mei Peking University DOI | ||
16:10 20mTalk | Arfa: an Agile Regime-based Floating-point Optimization Approach for Rounding Errors ISSTA Technical Papers Jinchen Xu Information Engineering University, Mengqi Cui Information Engineering University, Fei Li Information Engineering University, Zuoyan Zhang Hunan University, Changsha, Hunan, Hongru Yang Information Engineering University, Bei Zhou Information Engineering University, Jie Zhao Hunan University | ||
16:30 20mTalk | Automated Deep Learning Optimization via DSL-Based Source Code Transformation ISSTA Technical Papers Ruixin Wang Purdue University, Minghai Lu Purdue University, Cody Hao Yu BosonAI, Yi-Hsiang Lai Amazon Web Services, Tianyi Zhang Purdue University DOI | ||
16:50 20mTalk | Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines ISSTA Technical Papers Cuiying Gao Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Heng Li Huazhong University of Science and Technology, Wei Yuan Huazhong University of Science and Technology, Haoyu Jiang Huazhong University of Science and Technology, Qidan He Jingdong Group, Yang Liu Nanyang Technological University |
16:30 - 17:30 | |||
16:30 30mTalk | Devising a TraceObject Class for Improved Runtime Monitoring of ooRexx Applications VORTEX | ||
17:00 30mTalk | Identifying Potential Deadlocked Instructions in a Multi-threaded ooRexx Program VORTEX |
17:00 - 18:00 | |||
18:00 - 20:00 | |||
Fri 20 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Fri 20 Sep
Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 09:00 | |||
09:00 - 10:00 | |||
09:00 60mTalk | Miri: Practical Undefined Behavior Detection for Rust ICOOOLPS Ralf Jung ETH Zurich |
09:00 - 10:00 | |||
09:00 60mKeynote | Benchmarks and Replicability in Software Engineering Research: Challenges and Opportunities ISSTA Keynotes |
10:00 - 10:30 | |||
10:30 - 11:50 | |||
10:30 20mTalk | Inconsistencies in TeX-produced Documents ISSTA Technical Papers Pre-print | ||
10:50 20mTalk | Evaluating the Effectiveness of Decompilers ISSTA Technical Papers Ying Cao Institute of Information Engineering at Chinese Academy of Sciences, Runze Zhang Institute of Information Engineering at Chinese Academy of Sciences, Ruigang Liang Institute of Information Engineering at Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences DOI | ||
11:10 20mTalk | Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis ISSTA Technical Papers Chenyao Suo College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University, Shuang Liu Renmin University of China, Jiajun Jiang Tianjin University, Yingquan Zhao Tianjin University, Jianrong Wang College of Intelligence and Computing, Tianjin University | ||
11:30 20mTalk | Towards Understanding the Bugs in Solidity Compiler ISSTA Technical Papers Haoyang Ma Hong Kong University of Science and Technology, Wuqi Zhang The Hong Kong University of Science and Technology, Qingchao Shen Tianjin University, Yongqiang Tian The Hong Kong University of Science and Technology, Junjie Chen Tianjin University, Shing-Chi Cheung Hong Kong University of Science and Technology |
10:30 - 11:30 | |||
10:30 60mKeynote | Static Analysis for Software Security: Detecting Data Races in C FTfJP Omar Inverso Gran Sasso Science Institute |
10:30 - 11:50 | |||
10:30 20mTalk | Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries ISSTA Technical Papers Hao Xiong Zhejiang University, Qinming Dai Zhejiang University, Rui Chang Zhejiang University, Mingran Qiu Zhejiang University, Renxiang Wang Zhejiang University, Wenbo Shen Zhejing University, Yajin Zhou Zhejiang University DOI | ||
10:50 20mTalk | Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps ISSTA Technical Papers Dingbang Wang University of Connecticut, Yu Zhao University of Central Missouri, Sidong Feng Monash University, Zhaoxu Zhang University of Southern California, William G.J. Halfond University of Southern California, Chunyang Chen Technical University of Munich (TUM), Xiaoxia Sun China Mobile (Suzhou) Software Technology Co., Ltd., Jiangfan Shi , Tingting Yu University of Connecticut | ||
11:10 20mTalk | NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps ISSTA Technical Papers Jikai Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
11:30 20mTalk | Towards Automatic Oracle Prediction for AR testing: Assessing Virtual Object Placement Quality under Real-world Scenes ISSTA Technical Papers Xiaoyi Yang Rochester Institute of Technology, Yuxing Wang Rochester Institute of Technology, Tahmid Rafi University of Texas at San Antonio, Dongfang Liu Rochester Institute of Technology, Xiaoyin Wang University of Texas at San Antonio, Xueling Zhang Rochester Institute of Technology |
10:30 - 12:00 | |||
10:30 60mIndustry talk | Structured concurrency in Hylo ICOOOLPS Lucian Radu Teodorescu Garmin International | ||
11:30 30mResearch paper | Stack-copying Delimited Continuations for Scala Native ICOOOLPS |
10:30 - 11:50 | |||
10:30 20mTalk | Prospector: Boosting Directed Greybox Fuzzing for Large-scale Target Sets with Iterative Prioritization ISSTA Technical Papers Zhijie Zhang Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Liwei Chen Institute of Information Engineering, Chinese Academy of Sciences, Haolai Wei Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Gang Shi Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Dan Meng Institute of Information Engineering, Chinese Academy of Sciences | ||
10:50 20mTalk | FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation ISSTA Technical Papers Xizhe Yin Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Zixi Liu Nanjing University, Hongwang Liu Nanjing University, Baowen Xu Nanjing University | ||
11:10 20mTalk | DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling ISSTA Technical Papers Haoran Fang Shanghai Jiao Tong University, Kaikai Zhang Shanghai Jiao Tong University, Donghui Yu Shanghai Jiao Tong University, Yuanyuan Zhang Shanghai Jiao Tong University | ||
11:30 20mTalk | Logos: Log Guided Fuzzing for Protocol Implementations ISSTA Technical Papers Feifan Wu Tsinghua University, Zhengxiong Luo Tsinghua University, Yanyang Zhao Tsinghua University, Qingpeng Du Beijing University of Posts and Telecommunications, Junze Yu Tsinghua University, Ruikang Peng Central South University, Heyuan Shi Central South University, Yu Jiang Tsinghua University |
10:30 - 11:50 | |||
10:30 20mTalk | Total Recall? How Good Are Static Call Graphs Really? ISSTA Technical Papers Dominik Helm TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Sven Keidel TU Darmstadt, Germany, Anemone Kampkötter TU Dortmund, Johannes Düsing TU Dortmund University, Tobias Roth Technische Universität Darmstadt, Ben Hermann TU Dortmund, Mira Mezini TU Darmstadt DOI Pre-print | ||
10:50 20mTalk | Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language Features ISSTA Technical Papers Dominik Helm TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Tobias Roth Technische Universität Darmstadt, Sven Keidel TU Darmstadt, Germany, Michael Reif CQSE, Mira Mezini TU Darmstadt DOI | ||
11:10 20mTalk | Better Not Together: Staged Solving for Context-Free Language Reachability ISSTA Technical Papers Chenghang Shi SKLP, Institute of Computing Technology, CAS, Haofeng Li Institute of Computing Technology at Chinese Academy of Sciences, Jie Lu SKLP, Institute of Computing Technology, CAS, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Zhongguancun Laboratory | ||
11:30 20mTalk | Call Graph Soundness in Android Static Analysis ISSTA Technical Papers Jordan Samhi CISPA Helmholtz Center for Information Security, René Just University of Washington, Tegawendé F. Bissyandé University of Luxembourg, Michael D. Ernst University of Washington, Jacques Klein University of Luxembourg |
11:30 - 12:00 | |||
11:30 30mTalk | Towards a model checker for Python: pymodcheck FTfJP |
12:00 - 13:30 | |||
13:30 - 14:50 | |||
13:30 20mTalk | Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis ISSTA Technical Papers Shuwei Song University of Electronic Science and Technology of China, Jiachi Chen Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Xiapu Luo The Hong Kong Polytechnic University, Teng Li University of Electronic Science and Technology of China, Wenwu Yang University of Electronic Science and Technology of China, Leqing Wang University of Electronic Science and Technology of China, Weijie Zhang Jiangsu University of Science and Technology, Feng Luo The Hong Kong Polytechnic University, Zheyuan He University of Electronic Science and Technology of China, Yi Lu BitsLab, Singapore, Pan Li MoveBit, Hong Kong | ||
13:50 20mTalk | FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas Fees ISSTA Technical Papers DOI | ||
14:10 20mTalk | Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow ISSTA Technical Papers Jiachi Chen Sun Yat-sen University, Chong Chen Sun Yat-sen University, Jiang Hu Sun Yat-sen University, John Grundy Monash University, Yanlin Wang Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Zibin Zheng Sun Yat-sen University DOI Pre-print | ||
14:30 20mTalk | Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis ISSTA Technical Papers Mingxi Ye Sun Yat-sen University, Xingwei Lin Zhejiang University, Yuhong Nan Sun Yat-sen University, Jiajing Wu Sun Yat-sen University, Zibin Zheng Sun Yat-sen University |
13:30 - 15:00 | |||
13:30 30mTalk | Sound Static Analysis for Microservices: Utopia? A preliminary experience with LiSA FTfJP Giacomo Zanatta Ca’ Foscari University of Venice, Pietro Ferrara Università Ca' Foscari, Venezia, Italy, Teodors Lisovenko Ca' Foscari University of Venice, Luca Negrini Ca’ Foscari University of Venice, Gianluca Caiazza Ca' Foscari University of Venice, Ruffin White White Robotics | ||
14:00 30mTalk | Towards a Sound Construction of EVM Bytecode Control-flow Graphs FTfJP Vincenzo Arceri University of Parma, Italy, Saverio Mattia Merenda University of Parma, Italy, Greta Dolcetti Ca' Foscari University of Venice - Department of Environmental Sciences, Informatics and Statistics, Luca Negrini Ca’ Foscari University of Venice, Luca Olivieri University Ca' Foscari, Venice, Enea Zaffanella University of Parma, Italy | ||
14:30 30mTalk | Abstract Interpretation of Java Bytecode in Sturdy FTfJP |
13:30 - 15:00 | |||
13:30 - 14:50 | |||
13:30 20mTalk | Bridge and Hint: Extending Pre-trained Language Models for Long-Range Code ISSTA Technical Papers Yujia Chen Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Zezhou Yang Harbin Institute of Technology, Hongyu Zhang Chongqing University, Qing Liao Harbin Institute of Technology DOI | ||
13:50 20mTalk | CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-Decoding ISSTA Technical Papers Dong Li Chongqing University, China, Meng Yan Chongqing University, Yaosheng Zhang Chongqing University, Zhongxin Liu Zhejiang University, Chao Liu Chongqing University, Xiaohong Zhang Chongqing University, Ting Chen University of Electronic Science and Technology of China, David Lo Singapore Management University | ||
14:10 20mTalk | Oracle-guided Program Selection from Large Language Models ISSTA Technical Papers Zhiyu Fan National University of Singapore, Haifeng Ruan National University of Singapore, Sergey Mechtaev University College London, Abhik Roychoudhury National University of Singapore | ||
14:30 20mTalk | How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation ISSTA Technical Papers Cen Zhang Nanyang Technological University, Yaowen Zheng Nanyang Technological University, Mingqiang Bai Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Ma Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Yuekang Li The University of New South Wales, Limin Sun Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Yang Liu Nanyang Technological University |
13:30 - 14:50 | |||
13:30 20mTalk | Segment-based Test Case Prioritization: a Multi-objective Approach ISSTA Technical Papers Hieu Huynh Katalon LLC., Nhu Pham University of Science, VNU-HCM; Katalon LLC., Vu Nguyen University of Science, VNU-HCM; Katalon LLC., Tien N. Nguyen University of Texas at Dallas | ||
13:50 20mTalk | Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable Systems ISSTA Technical Papers Chuan Luo Beihang University, Shuangyu Lyu Beihang University, Qiyuan Zhao National University of Singapore, Wei Wu L3S Research Center, Leibniz University Hannover, Germany, Hongyu Zhang Chongqing University, Chunming Hu Beihang University | ||
14:10 20mTalk | Synthesis-based Enhancement for GUI Test Case Migration ISSTA Technical Papers Yakun Zhang Peking University, Qihao Zhu Peking University, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Chen Liu Clarkson University, Wenjie Zhang Peking University, Yifan Zhao Peking University, Dan Hao Peking University, Lu Zhang Peking University | ||
14:30 20mTalk | Revisiting Test-Case Prioritization on Long-Running Test Suites ISSTA Technical Papers Runxiang Cheng University of Illinois at Urbana-Champaign, Shuai Wang University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign |
15:00 - 15:30 | |||
15:30 - 16:30 | |||
15:30 20mTalk | Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge ISSTA Technical Papers XiaoweiGuo Huazhong University of Science and Technology, Cai Fu Huazhong University of Science and Technology, Juan Chen Xihua University, China, Hongle Liu Huazhong University of Science and Technology, Lansheng Han Huazhong University of Science and Technology, Wenjin Li NSFOCUS Technologies Group DOI | ||
15:50 20mTalk | Your "Notice" is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking ISSTA Technical Papers Kaifeng Huang Tongji University, Yingfeng Xia Fudan University, Bihuan Chen Fudan University, Siyang He Fudan University, Huazheng Zeng Fudan University, Zhuotong Zhou Fudan University, Jin Guo Fudan University, Xin Peng Fudan University | ||
16:10 20mTalk | DeLink: Source File Information Recovery in Binaries ISSTA Technical Papers Zhe Lang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences, Zhengzi Xu Nanyang Technological University, Xiaohui Chen Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences, lvshichao College of Cyberspace Security, Chinese Academy of Sciences, Zhanwei Song Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences, zhiqiang shi Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Limin Sun Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, |
15:30 - 17:30 | |||
15:30 30mTalk | Disjoint Polymorphism with Intersection and Union Types FTfJP | ||
16:00 30mTalk | Coeffects for MiniJava: Cf-Mj FTfJP | ||
16:30 30mTalk | Dafny vs. Dala: Experience with Mechanising Language Design FTfJP James Noble Independent. Wellington, NZ, Julian Mackay Victoria University of Wellington, Tobias Wrigstad Uppsala University, Andrew Fawcett Victoria University of Wellington, Michael Homer Victoria University of Wellington | ||
17:00 30mTalk | Incrementalizing Polynomial Functors FTfJP Timon Böhler Technical University of Darmstadt, David Richter Technical University of Darmstadt, Mira Mezini TU Darmstadt |
15:30 - 16:30 | |||
15:30 - 16:30 | |||
15:30 20mTalk | FDI: Attack Neural Code Generation Systems through User Feedback Channel ISSTA Technical Papers Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Australia, Xiapu Luo The Hong Kong Polytechnic University, Fu Song State Key Laboratory of Computer Science and Institute of Software, Chinese Academy of Sciences., David Lo Singapore Management University, Li Li Beihang University | ||
15:50 20mTalk | CoderUJB: An Executable and Unified Java Benchmark for Practical Programming Scenarios ISSTA Technical Papers Zhengran Zeng Peking University, Yidong Wang Peking University, Rui Xie Peking University, Wei Ye Peking University, Shikun Zhang Peking University DOI | ||
16:10 20mTalk | CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision ISSTA Technical Papers Hao Wang Tsinghua University, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Zihan Sha Information Engineering University, Mingyang Sun University of Electronic Science and Technology of China, Yuchen Zhou Beijing University of Technology, Wenyu Zhu Tsinghua University, Wenju Sun , Han Qiu Tsinghua University, Xi Xiao Tsinghua Shenzhen International Graduate School, Tsinghua University DOI |
15:30 - 16:30 | |||
15:30 20mTalk | Enhancing Multi-Agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation ISSTA Technical Papers Ma Xuyan University of Chinese Academy of Sciences, Beijing, China; Laboratory for Internet Software Technologies, Institute of Software Chinese Academy of Sciences, Beijing, China;, Yawen Wang Institute of Software, Chinese Academy of Sciences, Junjie Wang Institute of Software, Chinese Academy of Sciences, Xiaofei Xie Singapore Management University, Boyu Wu University of Chinese Academy of Sciences, Beijing, China, Shoubin Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Fanjiang Xu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software, Chinese Academy of Sciences | ||
15:50 20mTalk | Commit Artifact Preserving Build Prediction ISSTA Technical Papers Guoqing Wang Peking University, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Yizhou Chen Peking University, Yifan Zhao Peking University, Qingyuan Liang Peking University, Dan Hao Peking University | ||
16:10 20mTalk | Detecting Build Dependency Errors in Incremental Builds ISSTA Technical Papers Jun Lyu Nanjing University, Shanshan Li Software Institute, Nanjing University, He Zhang Nanjing University, Yang Zhang Nanjing University, Guoping Rong Nanjing University, Manuel Rigger National University of Singapore DOI |
16:30 - 17:00 | ISSTA 2025 Preview and ClosingISSTA Keynotes at EI 7 Chair(s): Maria Christakis TU Wien, Michael Pradel University of Stuttgart | ||