ISSTA 2025
Wed 25 - Sat 28 June 2025 Trondheim, Norway
VenueClarion Hotel Trondheim
Room nameAurora B
Floor0
Capacity98
Room InformationNo extra information available

Information for Participants
Info for room Aurora B:

Aurora B is the second room in the Aurora wing.

When facing the main Cosmos Hall, access to the Aurora wing is on the right, close to the side entrance of the hotel.

Program

You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 25 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

11:00 - 12:15
Security 1Research Papers at Aurora B
Chair(s): Haipeng Cai University at Buffalo, SUNY
11:00
25m
Talk
Beyond Static Pattern Matching? Rethinking Automatic Cryptographic API Misuse Detection in the Era of LLMs
Research Papers
Yifan Xia , Zichen Xie Zhejiang University, China, Peiyu Liu Zhejiang University, Kangjie Lu University of Minnesota, Yan Liu Ant Group, Wenhai Wang Zhejiang University, Shouling Ji Zhejiang University
DOI
11:25
25m
Talk
Pepper: Preference-Aware Active Trapping for Ransomware
Research Papers
Huan Zhang Institute of Information Engineering, Chinese Academy of Sciences, Zhengkai Qin Institute of Information Engineering,Chinese Academy of Sciences, Lixin Zhao Institute of Information Engineering,Chinese Academy of Sciences, Aimin Yu Institute of Information Engineering, Chinese Academy of Sciences, Lijun Cai Institute of Information Engineering,Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
11:50
25m
Talk
ICEPRE: ICS protocol reverse engineering via data-driven concolic execution
Research Papers
Yibo Qu Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Zhen Wang Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Jiaxing Cheng Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Shuaizong Si Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Yongle Chen Taiyuan University of Technology, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
14:00 - 15:15
Autonomous SystemsResearch Papers at Aurora B
Chair(s): Shin Yoo KAIST
14:00
25m
Talk
MoDitector: Module-Directed Testing for Autonomous Driving Systems
Research Papers
Renzhi Wang University of Alberta, Mingfei Cheng Singapore Management University, Xiaofei Xie Singapore Management University, Yuan Zhou Zhejiang Sci-Tech University, Lei Ma The University of Tokyo & University of Alberta
DOI
14:25
25m
Talk
RouthSearch: Inferring PID Parameter Specification for Flight Control Program by Coordinate Search
Research Papers
Siao Wang Fudan University, Zhen Dong Fudan University, Hui Li Fudan University, China, Liwei Shen Fudan University, China, Xin Peng Fudan University, Dongdong She HKUST (The Hong Kong University of Science and Technology)
DOI
14:50
25m
Talk
Testing the Fault-Tolerance of Multi-Sensor Fusion Perception in Autonomous Driving Systems
Research Papers
Haoxiang Tian Institute of Software, Chinese Academy of Sciences, wenqiang ding Nanjing Institute of Software, Nanjing, China, Xingshuo Han Nanyang Technological University, Singapore, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, An Guo Nanjing University, Junqi Zhang University of Science and Technology of China, China, Wei Chen Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tianwei Zhang Nanyang Technological University
DOI
16:00 - 17:15
Database TestingResearch Papers at Aurora B
Chair(s): Alberto Martin-Lopez Software Institute - USI, Lugano
16:00
25m
Talk
QTRAN: Extending Metamorphic-Oracle based Logical Bug Detection Techniques for Multiple-DBMS Dialect Support
Research Papers
Li Lin Xiamen University, Qinglin Zhu School of Informatics, Xiamen University, Hongqiao Chen School of Informatics, Xiamen University, Zhuangda Wang Xiamen University, Rongxin Wu Xiamen University, Xiaoheng Xie Ant Group
DOI
16:25
25m
Talk
Detecting Isolation Anomalies in Relational DBMSs
Research Papers
Rui Yang Institute of Software, Chinese Academy of Sciences, Ziyu Cui Institute of Software at Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiansen Song Institute of Software at Chinese Academy of Sciences, Xudong Xie Institute of Software Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
16:50
25m
Talk
Understanding Practitioners’ Expectations on Clear Code Review Comments
Research Papers
Junkai Chen Singapore Management University, Singapore, Zhenhao Li York University, Qiheng Mao Zhejiang University, Xing Hu Zhejiang University, Kui Liu Huawei, Xin Xia Zhejiang University
DOI

Wed 25 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change