ISSTA 2025
Wed 25 - Sat 28 June 2025 Trondheim, Norway
VenueClarion Hotel Trondheim
Room nameCosmos 3B
Floor0
Capacity134
Room InformationNo extra information available

Information for Participants
Info for room Cosmos 3B:

Cosmos 3B is the second room in the Cosmos 3 wing.

When facing the main Cosmos Hall, access to the Cosmos 3 wing is on the left, close to the stairs. The area is accessed through a large door with the number “3”, which will stay open during the event.

Program

You're viewing the program in a time zone which is different from your device's time zone change time zone

Thu 26 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

11:00 - 12:15
Bugs and Repository MiningResearch Papers at Cosmos 3B
Chair(s): Shiyi Wei University of Texas at Dallas
11:00
25m
Talk
LLM4SZZ: Enhancing SZZ Algorithm with Context-Enhanced Assessment on Large Language Models
Research Papers
Lingxiao Tang Zhejiang University, Jiakun Liu Singapore Management University, Zhongxin Liu Zhejiang University, Xiaohu Yang Zhejiang University, Lingfeng Bao Zhejiang University
DOI
11:25
25m
Talk
Walls Have Ears: Demystifying Notification Listener Usage in Android Apps
Research Papers
Jiapeng Deng Huazhong University of Science and Technology, Tianming Liu Monash Univerisity, Yanjie Zhao Huazhong University of Science and Technology, Chao Wang University of Science and Technology of China, Lin Zhang The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC), Haoyu Wang Huazhong University of Science and Technology
DOI
11:50
25m
Talk
An Investigation on Numerical Bugs in GPU Programs Towards Automated Bug Detection
Research Papers
Ravishka Shemal Rathnasuriya The University of Texas - Dallas, Nidhi Majoju University of Texas at Dallas, Zihe Song University of Texas at Dallas, Wei Yang UT Dallas
DOI
14:00 - 15:15
Program Analysis 1Research Papers at Cosmos 3B
Chair(s): Martin Kellogg New Jersey Institute of Technology
14:00
25m
Talk
Bridge the Islands: Pointer Analysis for Microservice Systems
Research Papers
Teng Zhang Nanjing University, Yufei Liang Nanjing University, Ganlin Li Nanjing University, Tian Tan Nanjing University, Chang Xu Nanjing University, Yue Li Nanjing University
DOI
14:25
25m
Talk
Program Analysis Combining Generalized Bit-Level and Word-Level Abstractions
Research Papers
Guangsheng Fan National University of Defense Technology, Liqian Chen National University of Defense Technology, Banghu Yin College of Computer, National University of Defense Technology, Changsha, China, Wenyu Zhang National University of Defense Technology, Peisen Yao Zhejiang University, Ji Wang National University of Defense Technology
DOI
14:50
25m
Talk
Type-Alias Analysis: Enabling LLVM IR with Accurate Types
Research Papers
Jinmeng Zhou Zhejiang University, Ziyue Pan Zhejiang University, Wenbo Shen Zhejiang University, Xingkai Wang Zhejiang University, Kangjie Lu University of Minnesota, Zhiyun Qian University of California at Riverside, USA
DOI
16:00 - 17:15
Decompilation and TracingResearch Papers at Cosmos 3B
Chair(s): Philipp Straubinger University of Passau
16:00
25m
Talk
DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code
Research Papers
WONG Wai Kin Hong Kong University of Science and Technology, Daoyuan Wu Hong Kong University of Science and Technology, Huaijin Wang Ohio State University, Li Zongjie Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen Lab
DOI
16:25
25m
Talk
DataHook: An Efficient and Lightweight System Call Hooking Technique without Instruction Modification
Research Papers
Quan Hong Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, Jiaqi Li Institute of Information Engineering, Chinese Academy of Sciences, Wen Zhang China Unicom Online Information Technology CO.,Ltd, Lidong Zhai Institute of Information Engineering, Chinese Academy of Sciences
DOI
16:50
25m
Talk
Tracezip: Efficient Distributed Tracing via Trace Compression
Research Papers
Zhuangbin Chen Sun Yat-sen University, Junsong Pu Beijing University of Posts and Telecommunication, Zibin Zheng Sun Yat-sen University
DOI

Fri 27 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

11:00 - 12:15
Program Analysis 2Research Papers at Cosmos 3B
Chair(s): Alexi Turcotte CISPA
11:00
25m
Talk
Bridging the Gaps Between Graph Neural Networks and Data-Flow Analysis: The Closer, the Better
Research Papers
Qingchen Yu Zhejiang University, Xin Liu Lanzhou University, Qingguo Zhou Lanzhou University, Chunming Wu Zhejiang University
DOI
11:25
25m
Talk
Clause2Inv: A Generate-Combine-Check Framework for Loop Invariant Inference
Research Papers
Weining Cao Nanjing University, China, Guangyuan Wu Nanjing University, China, Tangzhi Xu Nanjing University, China, Yuan Yao Nanjing University, Hengfeng Wei State Key Laboratory for Novel Software Technology, Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma Nanjing University
DOI
11:50
25m
Talk
Incremental Verification of Concurrent Programs through Refinement Constraint Adaptation
Research Papers
Liangze Yin National University of Defense Technology, Yiwei Li , Kun Chen National University of Defense Technology, Wei Dong National University of Defense Technology, Ji Wang National University of Defense Technology
DOI
14:00 - 15:30
Binary Code Analysis and OptimizationResearch Papers / Tool Demonstrations at Cosmos 3B
Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security
14:00
25m
Talk
BinQuery: A Novel Framework for Natural Language-Based Binary Code Retrieval
Research Papers
Bolun Zhang Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China, Zeyu Gao Tsinghua University, Hao Wang Tsinghua University, Yuxin Cui Institute for Network Sciences and Cyberspace, Tsinghua University, Siliang Qin Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China, Chao Zhang Tsinghua University, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Beibei Zhao Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China
DOI
14:25
25m
Talk
Wemby’s Web: Hunting for Memory Corruption in WebAssembly
Research Papers
Oussama Draissi University of Duisburg-Essen, Tobias Cloosters University of Duisburg-Essen, David Klein TU Braunschweig, Michael Rodler Amazon Web Services, Marius Musch TU Braunschweig, Martin Johns TU Braunschweig, Lucas Davi University of Duisburg-Essen
DOI
14:50
25m
Talk
Doctor: Optimizing Container Rebuild Efficiency by Instruction Re-Orchestration
Research Papers
Zhiling Zhu Zhejiang University of Technology, Tieming Chen Zhejiang University of Technology, Chengwei Liu Nanyang Technological University, Han Liu The Hong Kong University of Science and Technology, Qijie Song Zhejiang University of Technology, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Yang Liu Nanyang Technological University
DOI
15:15
15m
Demonstration
ReGraph: A Tool for Binary Similarity Identification
Tool Demonstrations
16:00 - 17:15
Smart Contracts 2Research Papers at Cosmos 3B
Chair(s): Zhenbang Chen College of Computer, National University of Defense Technology
16:00
25m
Talk
OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum Virtual Machine
Research Papers
Jie Ma Beihang University; Zhongguancun Laboratory, Ningyu He Hong Kong Polytechnic University, Jinwen Xi , Mingzhe Xing Zhongguancun Laboratory, Haoyu Wang Huazhong University of Science and Technology, Ying Gao School of Cyber Science and Technology, Beihang University; Zhongguancun Laboratory, Yinliang Yue Zhongguancun Laboratory
DOI
16:25
25m
Talk
Why Does My Transaction Fail? A First Look at Failed Transactions on the Solana Blockchain
Research Papers
Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, David Lo Singapore Management University, Difan Xie Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Xiaohu Yang Zhejiang University
DOI
16:50
25m
Talk
Automated Attack Synthesis for Constant Product Market Makers
Research Papers
Sujin Han KAIST, Jinseo Kim KAIST, Sung-Ju Lee KAIST, Insu Yun KAIST
DOI Pre-print

Sat 28 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

09:00 - 10:30
Trustworthy AI for CodeEXPRESS at Cosmos 3B
Chair(s): Peng Di Ant Group & UNSW Sydney, Puzhuo Liu Ant Group & Tsinghua University
09:00
10m
Day opening
Opening and Welcome
EXPRESS

09:10
60m
Keynote
Human-like AI Auditor for Code Repositories
EXPRESS
Xiangyu Zhang Purdue University
10:10
20m
Talk
FuseApplyBench: Multilingual Benchmark for Trustworthy Code Edit Applying Task
EXPRESS
Ming Liang Ant Group, Qingyu Zhang the University of Hong Kong, Zhipeng Zuo Ant Group, Shaoqiang Zheng Ant Group, Dajun Chen Ant Group, Wei Jiang Ant Group, Yong Li Ant Group
11:00 - 12:30
Intelligence and PrivacyEXPRESS at Cosmos 3B
Chair(s): Peng Di Ant Group & UNSW Sydney, Puzhuo Liu Ant Group & Tsinghua University
11:00
20m
Talk
Patch the Leak: Strengthening CodeLLMs Against Privacy Extraction Threats
EXPRESS
Yongjian Guo Tsinghua University & Ant Group, Wanlun Ma Swinburne University of Technology, Xi Xiao Tsinghua University, Sheng Wen Swinburne University of Technology, Peng Di Ant Group & UNSW Sydney, Xiaogang Zhu The University of Adelaide
11:20
20m
Talk
From Large Language Models to Adversarial Malware: How far are we
EXPRESS
Shuai He Huazhong University of Science and Technology, Hao Yan Huazhong University of Science and Technology, Wenke Li Huazhong University of Science and Technology, Sheng Hong Huazhong University of Science and Technology, Xiaowei Guo Huazhong University of Science and Technology, Xiaofan Liu Huazhong University of Science and Technology, Cai Fu Huazhong University of Science and Technology
11:40
20m
Talk
Towards Source Mapping for Zero-Knowledge Smart Contracts: Design and Preliminary Evaluation
EXPRESS
Pei Xu University of Technology Sydney, Yulei Sui University of New South Wales, Mark Staples Digital Finance CRC
12:00
20m
Talk
TestFlow: Advancing Mobile UI Testing through Multi-Step Reinforcement Learning
EXPRESS
Xiaoxuan Tang Ant Group, Xinfang Chen Ant Group, Dajun Chen Ant Group, Sheng Zhou Zhejiang University, Wei Jiang Ant Group, Yong Li Ant Group
12:20
10m
Day closing
Discussion and Conclusion
EXPRESS

Thu 26 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

Fri 27 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

Sat 28 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change