Write a Blog >>
ICSE 2023
Sun 14 - Sat 20 May 2023 Melbourne, Australia
You're viewing the program in a time zone which is different from your device's time zone change time zone

Sat 20 May

Displayed time zone: Hobart change

09:00 - 10:30
Opening and KeynoteSVM at Meeting Room 104
Chair(s): Muhammad Ali Babar University of Adelaide, Triet Le Huynh Minh The University of Adelaide
09:00
15m
Day opening
Opening
SVM
Muhammad Ali Babar University of Adelaide, Triet Le Huynh Minh The University of Adelaide
09:15
60m
Keynote
Keynote: Applying psychological theories to improve software vulnerability management
SVM
Monica Whitty Monash University
10:15
15m
Full-paper
VrT: Vulnerabilities Reports Tagger Machine Learning Driven Cybersecurity Tool for Vulnerability Classification
SVM
10:30
30m
Coffee break
Morning tea
SVM

11:00 - 12:30
Paper Session 1SVM at Meeting Room 104
Chair(s): M. Mehdi Kholoosi University of Adelaide
11:00
15m
Full-paper
A Static Analysis Platform for Investigating Security Trends in Repositories
SVM
Tim Sonnekalb German Aerospace Center (DLR), Christopher-Tobias Knaust , Thomas S. Heinze Aarhus University, Denmark, Clemens-Alexander Brust German Aerospace Center (DLR), Bernd Gruner DLR Institute of Data Science, Lynn von Kurnatowski German Aerospace Center, Andreas Schreiber German Aerospace Center (DLR), Patrick Mäder Technische Universität Ilmenau
11:15
15m
Full-paper
An Empirical Study on Workflows and Security Policies in Popular GitHub Repositories
SVM
Jessy Ayala University of California Irvine, Joshua Garcia University of California, Irvine
11:40
50m
Talk
Group forming and discussion - SVM gaps between academia and practice
SVM

13:45 - 15:15
Paper Session 2SVM at Meeting Room 104
Chair(s): Roland Croft The University of Adelaide
13:45
15m
Talk
Invited talk - (Dr. Hyun Sangwon)
SVM
Sangwon Hyun University of Adelaide
14:00
15m
Talk
Invited talk - Incident Prevention Through Reliable Changes Development: Progress and Future Plans
SVM
Eileen Kapel Delft University of Technology
14:15
15m
Talk
Invited talk - Software vulnerabilities causing timing attacks: An empirical study
SVM
M. Mehdi Kholoosi University of Adelaide
14:30
15m
Full-paper
Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure
SVM
Rikuho Miyata , Hironori Washizaki Waseda University, Kensuke Sumoto , Nobukazu Yoshioka Waseda University, Japan, Yoshiaki Fukazawa Waseda University, Takao Okubo Institute of Information Security
14:45
30m
Panel
Panel discussion - Reflections and Visions for SVM
SVM

15:15
10m
Day closing
Closing
SVM