ASE 2025
Sun 16 - Thu 20 November 2025 Seoul, South Korea
Dates
Tracks
You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 17 Nov

Displayed time zone: Seoul change

09:00 - 18:00
Quiet RoomCatering at Ida 1
09:00
9h
Other
Quiet Room
Catering

09:00 - 18:00
Prayer RoomCatering at Ida 2
09:00
9h
Other
Prayer Room
Catering

09:00 - 09:30
OpeningKeynote at Vista
09:00
30m
Keynote
ASE Opening
Keynote
Shin Yoo KAIST, Marcel Böhme MPI for Security and Privacy, Lingming Zhang University of Illinois at Urbana-Champaign
10:30 - 11:00
10:30
30m
Coffee break
Break
Catering

11:00 - 12:30
Program Repair 1Research Papers / Journal-First at Grand Hall 1
Chair(s): Chao Peng ByteDance
11:00
10m
Talk
Defects4C: Benchmarking Large Language Model Repair Capability with C/C++ Bugs
Research Papers
Jian Wang Nanyang Technological University, Xiaofei Xie Singapore Management University, Qiang Hu Tianjin University, Shangqing Liu Nanjing University, Jiongchi Yu Singapore Management University, Jiaolong Kong Singapore Management University, Yi Li Nanyang Technological University
Pre-print
11:10
10m
Talk
MORepair: Teaching LLMs to Repair Code via Multi-Objective Fine-Tuning
Journal-First
Boyang Yang Yanshan University, Haoye Tian Aalto University, Jiadong Ren Yanshan University, Hongyu Zhang Chongqing University, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Claire Le Goues Carnegie Mellon University, Shunfu Jin Yanshan University
Link to publication DOI Pre-print
11:20
10m
Talk
Test-based Patch Clustering for Automatically-Generated Patches Assessment
Journal-First
Matias Martinez Universitat Politècnica de Catalunya (UPC), Maria Kechagia National and Kapodistrian University of Athens, Anjana Perera Oracle Labs, Australia, Justyna Petke University College London, Federica Sarro University College London, Aldeida Aleti Monash University
11:30
10m
Talk
Hierarchical Knowledge Injection for Improving LLM-based Program Repair
Research Papers
Ramtin Ehsani Drexel University, Esteban Parra Rodriguez Belmont University, Sonia Haiduc Florida State University, Preetha Chatterjee Drexel University, USA
Pre-print
11:40
10m
Talk
Characterizing Multi-Hunk Patches: Divergence, Proximity, and LLM Repair ChallengesACM SIGSOFT Distinguished Paper Award
Research Papers
Noor Nashid University of British Columbia, Daniel Ding University of British Columbia, Keheliya Gallaba Centre for Software Excellence, Ahmed E. Hassan Queen’s University, Ali Mesbah University of British Columbia
Pre-print
11:50
10m
Talk
Reinforcement Learning for Mutation Operator Selection in Automated Program Repair
Journal-First
Carol Hanna University College London, Aymeric Blot University of Rennes, IRISA / INRIA, Justyna Petke University College London
12:00
10m
Talk
Seeing is Fixing: Cross-Modal Reasoning with Multimodal LLMs for Visual Software Issue RepairACM SIGSOFT Distinguished Paper Award
Research Papers
Kai Huang Technical University of Munich, Jian Zhang Nanyang Technological University, Xiaofei Xie Singapore Management University, Chunyang Chen TU Munich
11:00 - 12:30
Bug Understanding 1Research Papers / Journal-First at Grand Hall 2
Chair(s): Michael Pradel CISPA Helmholtz Center for Information Security
11:00
10m
Talk
The Fault in our Stats
Research Papers
Alexi Turcotte CISPA, Neev Nirav Mehta Saarland University
11:10
10m
Talk
Agents in the Sandbox: End-to-End Crash Bug Reproduction for Minecraft
Research Papers
Eray Yapağcı Bilkent University, Yavuz Alp Sencer Öztürk Bilkent University, Eray Tüzün Bilkent University
Pre-print
11:20
10m
Talk
Finding Bugs in MLIR Compiler Infrastructure via Lowering Space ExplorationACM SIGSOFT Distinguished Paper Award
Research Papers
Jingjing Liang East China Normal University, Shan Huang East China Normal University, Ting Su East China Normal University
11:30
10m
Talk
Why Do Machine Learning Notebooks Crash? An Empirical Study on Public Python Jupyter Notebooks
Journal-First
Yiran Wang Linköping University, Willem Meijer Linköping University, José Antonio Hernández López Universidad de Murcia, Ulf Nilsson Linköping University, Daniel Varro Linköping University / McGill University
11:40
10m
Talk
When AllClose Fails: Round-Off Error Estimation for Deep Learning Programs
Research Papers
Qi Zhan Zhejiang University, Xing Hu Zhejiang University, Yuanyi Lin Huawei Technologies, Tongtong Xu Huawei, Xin Xia Zhejiang University, Shanping Li Zhejiang University
11:50
10m
Talk
LLM-Powered Multi-Agent Collaboration for Intelligent Industrial On-Call Automation
Research Papers
Ruowei Fu Nankai University, Yang Zhang ByteDance Inc., Zeyu Che Nankai University, Xin Wu ByteDance Inc., Zhenyu Zhong Nankai University, Zhiqiang Ren ByteDance Inc., Shenglin Zhang Nankai University, Feng Wang ByteDance Inc., Yongqian Sun Nankai University, Xiaozhou Liu ByteDance Inc., Kexin Liu Nankai University, Yu Zhang ByteDance Inc.
12:00
10m
Talk
SSR: Safeguarding Staking Rewards by Defining and Detecting Logical Defects in DeFi Staking
Research Papers
Zewei Lin Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Jingwen Zhang School of Software Engineering, Sun Yat sen University, Zexu Wang Sun Yat-sen University, Yuming Feng Peng Cheng Laboratory, Weizhe Zhang Harbin Institute of Technology, Zibin Zheng Sun Yat-sen University
12:10
10m
Talk
Finding Bugs in WebAssembly Interface Type Binding Generators
Research Papers
Ethan Stanley University of Utah, Eric Eide University of Utah
12:20
10m
Talk
LineBreaker: Finding Token-Inconsistency Bugs using Large Language Models
Research Papers
Hongbo Chen Indiana University Bloomington, Yifan Zhang San Diego State University, Xing Han The Hong Kong University of Science and Technology, Tianhao Mao Indiana University, Huanyao Rong Indiana University Bloomington, Yuheng Zhang Tsinghua University, Hang Zhang Indiana University, XiaoFeng Wang ACM member, Luyi Xing Indiana University Bloomington/University of Illinois Urbana-Champaign, Xun Chen Samsung Research America
11:00 - 12:30
Autonomous Driving & VRResearch Papers / Journal-First at Grand Hall 3
Chair(s): Fabrizio Pastore University of Luxembourg
11:00
10m
Talk
ADPerf: Investigating and Testing Performance in Autonomous Driving Systems
Research Papers
Tri Minh-Triet Pham Concordia University, Diego Elias Costa Concordia University, Canada, Weiyi Shang University of Waterloo, Jinqiu Yang Concordia University
11:10
10m
Talk
VRTestSniffer: Test Smell Detector for Virtual Reality (VR) Software Projects
Research Papers
Faraz Gurramkonda University of Michigan-Dearborn, Avishak Chakroborty University of Michigan-Dearborn, Bruce Maxim University of Michigan - Dearborn, Mohamed Wiem Mkaouer University of Michigan - Flint, Foyzul Hassan University of Michigan at Dearborn
11:20
10m
Talk
A Multi-Modality Evaluation of the Reality Gap in Autonomous Driving Systems
Research Papers
Stefano Carlo Lambertenghi Technische Universität München, fortiss GmbH, Mirena Flores Valdez Technical University of Munich, Andrea Stocco Technical University of Munich, fortiss
Pre-print
11:30
10m
Talk
On the Robustness Evaluation of 3D Obstacle Detection Against Specifications in Autonomous Driving
Research Papers
Tri Minh-Triet Pham Concordia University, Bo Yang Concordia University, Jinqiu Yang Concordia University
11:40
10m
Talk
TARGET: Traffic Rule-Based Test Generation for Autonomous Driving via Validated LLM-Guided Knowledge Extraction
Journal-First
Yao Deng Macquarie University, Zhi Tu Purdue University, Jiaohong Yao Macquarie University, Mengshi Zhang TensorBlock, Tianyi Zhang Purdue University, Xi Zheng Macquarie University
11:50
10m
Talk
IMUFUZZER: Resilience-based Discovery of Signal Injection Attacks on Robotic Aerial Vehicles
Research Papers
Sudharssan Mohan University of Texas at Dallas, Kyeongseok Yang Korea University, Zelun Kong The University of Texas at Dallas, Yonghwi Kwon University of Maryland, Junghwan Rhee University of Central Oklahoma, Tyler Summers University of Texas at Dallas, Hongjun Choi DGIST, Heejo Lee Korea University, Chung Hwan Kim University of Texas at Dallas
12:00
10m
Talk
Argus: Resilience-Oriented Safety Assurance Framework for End-to-End ADSs
Research Papers
Dingji Wang Fudan University, You Lu Fudan University, Bihuan Chen Fudan University, Shuo Hao Fudan University, Haowen Jiang Fudan University, China, Yifan Tian Fudan University, Xin Peng Fudan University
Pre-print
12:10
10m
Research paper
VRExplorer: A Model-based Approach for Automated Virtual Reality Scene Testing
Research Papers
Zhu Zhengyang Sun Yat-sen University, Hong-Ning Dai Hong Kong Baptist University, Hanyang Guo School of Software Engineering, Sun Yat-sen University, Zeqin Liao Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
Pre-print
12:20
10m
Talk
When Autonomous Vehicle Meets V2X Cooperative Perception: How Far Are We?
Research Papers
An Guo Nanjing University, Shuoxiao Zhang Nanjing University, Enyi Tang Nanjing University, Xinyu Gao , Haomin Pang Guangzhou University, Haoxiang Tian Nanyang Technological University, Singapore, Yanzhou Mu , Wu Wen Guangzhou University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University
Pre-print
11:00 - 12:20
Efficiency & Fairness 1Research Papers at Grand Hall 4
Chair(s): Lwin Khin Shar Singapore Management University
11:00
10m
Talk
AutoFid: Adaptive and Noise-Aware Fidelity Measurement for Quantum Programs via Circuit Graph Analysis
Research Papers
Tingting Li Zhejiang University, Ziming Zhao Zhejiang University, Jianwei Yin Zhejiang University
11:10
10m
Talk
HybridSIMD: A Super C++ SIMD Library with Integrated Auto-tuning Capabilities
Research Papers
Haolin Pan Institute of Software, Chinese Academy of Sciences;School of Intelligent Science and Technology, HIAS, UCAS, Hangzhou;University of Chinese Academy of Sciences, Xulin Zhou Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mingjie Xing Institute of Software, Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences
11:20
10m
Talk
PEACE: Towards Efficient Project-Level Performance Optimization via Hybrid Code Editing
Research Papers
Xiaoxue Ren Zhejiang University, Jun Wan Zhejiang University, Yun Peng The Chinese University of Hong Kong, Zhongxin Liu Zhejiang University, Ming Liang Ant Group, Dajun Chen Ant Group, Wei Jiang Ant Group, Yong Li Ant Group
Pre-print
11:30
10m
Talk
CoTune: Co-evolutionary Configuration Tuning
Research Papers
Gangda Xiong University of Electronic Science and Technology of China, Tao Chen University of Birmingham
Pre-print
11:40
10m
Talk
It's Not Easy Being Green: On the Energy Efficiency of Programming Languages
Research Papers
Nicolas van Kempen University of Massachusetts Amherst, USA, Hyuk-Je Kwon University of Massachusetts Amherst, Dung Nguyen University of Massachusetts Amherst, Emery D. Berger University of Massachusetts Amherst and Amazon Web Services
11:50
10m
Talk
When Faster Isn't Greener: The Hidden Costs of LLM-Based Code Optimization
Research Papers
Tristan Coignion Université de Lille - Inria, Clément Quinton Université de Lille, Romain Rouvoy University Lille 1 and INRIA
12:00
10m
Talk
United We Stand: Towards End-to-End Log-based Fault Diagnosis via Interactive Multi-Task Learning
Research Papers
Minghua He Peking University, Chiming Duan Peking University, Pei Xiao Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Siyu Yu The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Lingzhe Zhang Peking University, China, Weijie Hong Peking university, Jing Han ZTE Corporation, Yifan Wu Peking University, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University
12:10
10m
Talk
Diplomatist: What Do Cross-language Dependencies Reflect Software Ecosystem Health?
Research Papers
Fanyi Meng Shenyang University of Technology, Ying Wang Northeastern University, Chun Yong Chong Monash University Malaysia, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China
11:00 - 12:30
Log & Dependency 1Research Papers / Journal-First at Grand Hall 5
Chair(s): Yintong Huo Singapore Management University, Singapore
11:00
10m
Talk
LogMoE: Lightweight Expert Mixture for Cross-System Log Anomaly DetectionACM SIGSOFT Distinguished Paper Award
Research Papers
Jiaxing Qi Beihang University, Zhongzhi Luan Beihang University, Shaohan Huang Beihang University, Carol Fung Concordia University, Yuchen Wang Beihang University, Aibin Wang Beihang University, Hongyu Zhang Chongqing University, Hailong Yang Beihang University, China, Depei Qian Beihang University, China
11:10
10m
Talk
Improving LLM-based Log Parsing by Learning from Errors in Reasoning Traces
Research Papers
Wang Jialai National University of Singapore, Juncheng Lu Southeast University, Jie Yang Wuhan University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Zhenkai Liang NUS, Ee-Chien Chang School of Computing, NUS
11:20
10m
Talk
LogUpdater: Automated Detection and Repair of Specific Defects in Logging Statements
Journal-First
Renyi Zhong The Chinese University of Hong Kong, Yichen LI ByteDance, Jinxi Kuang The Chinese University of Hong Kong, Wenwei Gu The Chinese University of Hong Kong, Yintong Huo Singapore Management University, Singapore, Michael Lyu The Chinese University of Hong Kong
11:30
10m
Talk
LogAction: Consistent Cross-system Anomaly Detection through Logs via Active Domain Adaptation
Research Papers
Chiming Duan Peking University, Minghua He Peking University, Pei Xiao Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Xin Zhang Peking University, Zhewei Zhong Bytedance, Xiang Luo Bytedance, Yan Niu Bytedance, Lingzhe Zhang Peking University, China, Yifan Wu Peking University, Siyu Yu The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Weijie Hong Peking university, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University
11:40
10m
Talk
Defects4Log: Benchmarking LLMs for Logging Code Defect Detection and Reasoning
Research Papers
Xin Wang Changsha University of Science and Technology, Zhenhao Li York University, Zishuo Ding The Hong Kong University of Science and Technology (Guangzhou)
11:50
10m
Talk
Which Is Better For Reducing Outdated And Vulnerable Dependencies: Pinning Or Floating?
Research Papers
Imranur Rahman North Carolina State University, Jill Marley North Carolina State University, William Enck North Carolina State University, Laurie Williams North Carolina State University
12:00
10m
Talk
On Automating Configuration Dependency Validation via Retrieval-Augmented Generation
Research Papers
Sebastian Simon Leipzig University, Alina Mailach Leipzig University, Johannes Dorn Leipzig University, Norbert Siegmund Leipzig University
Pre-print
12:10
10m
Talk
CollaborLog: Efficient-Generalizable Log Anomaly Detection via Large-Small Model Collaboration in Software Evolution
Research Papers
Pei Xiao Peking University, Chiming Duan Peking University, Minghua He Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Yifan Wu Peking University, Jing Xu ByteDance, Gege Gao ByteDance, Lingzhe Zhang Peking University, China, Weijie Hong Peking university, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University
11:00 - 12:30
SE4AI & AI4SE 1Research Papers / Journal-First at Vista
Chair(s): Zhou Yang University of Alberta, Alberta Machine Intelligence Institute
11:00
10m
Talk
TensorGuard: Gradient-Based Model Fingerprinting for LLM Similarity Detection and Family Classification
Research Papers
Zehao Wu Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
11:10
10m
Talk
Root Cause Analysis of RISC-V Build Failures via LLM and MCTS Reasoning
Research Papers
Weipeng Shuai Institute of Software, Chinese Academy of Sciences, Jie Liu Institute of Software, Chinese Academy of Sciences, Zhirou Ma Institute of Software, Chinese Academy of Sciences, Liangyi Kang Institute of Software, Chinese Academy of Sciences, Zehua Wang Institute of Software, Chinese Academy of Sciences, Shuai Wang Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software at Chinese Academy of Sciences, Hui Li , Wei Wang Institute of Software at Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences
11:20
10m
Talk
An Empirical Study of Knowledge Transfer in AI Pair Programming
Research Papers
Alisa Carla Welter Saarland University, Niklas Schneider Saarland University, Tobias Dick Saarland University, Kallistos Weis Saarland University, Christof Tinnes Siemens AG, Marvin Wyrich Saarland University, Sven Apel Saarland University
11:30
10m
Talk
Efficient Understanding of Machine Learning Model Mispredictions
Research Papers
Martin Eberlein Humboldt-Universtität zu Berlin, Jürgen Cito TU Wien, Lars Grunske Humboldt-Universität zu Berlin
11:40
10m
Talk
Can Mamba Be Better? An Experimental Evaluation of Mamba in Code Intelligence
Research Papers
Shuo Liu City University of Hong Kong, Jacky Keung City University of Hong Kong, Zhen Yang Shandong University, Zhenyu Mao City University of Hong Kong, Yicheng Sun City University of Hong Kong
11:50
10m
Talk
"My productivity is boosted, but ..." Demystifying Users’ Perception on AI Coding AssistantsACM SIGSOFT Distinguished Paper Award
Research Papers
Yunbo Lyu Singapore Management University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Jieke Shi Singapore Management University, Chang Jianming , Yue Liu Monash University, David Lo Singapore Management University
Pre-print
12:00
10m
Talk
HFUZZER: Testing Large Language Models for Package Hallucinations via Phrase-based Fuzzing
Research Papers
Yukai Zhao , Menghan Wu Zhejiang University, Xing Hu Zhejiang University, Xin Xia Zhejiang University
12:10
10m
Talk
Provable Fairness Repair for Deep Neural Networks
Research Papers
Jianan Ma Hangzhou Dianzi University, China; Zhejiang University, Hangzhou, China, Jingyi Wang Zhejiang University, Qi Xuan Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Zhen Wang Hangzhou Dianzi University, China
12:20
10m
Talk
AutoAdapt: On the Application of AutoML for Parameter-Efficient Fine-Tuning of Pre-Trained Code Models
Journal-First
Amal Akli University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Mike Papadakis University of Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
12:30 - 14:00
12:30
90m
Lunch
Lunch
Catering

14:00 - 15:30
Testing & Analysis 1Research Papers / Journal-First at Grand Hall 1
Chair(s): Rohan Padhye Carnegie Mellon University
14:00
10m
Talk
Mokav: Execution-driven Differential Testing with LLMs
Journal-First
Khashayar Etemadi ETH Zurich, Bardia Mohammadi Sharif University of Technology, Zhendong Su ETH Zurich, Martin Monperrus KTH Royal Institute of Technology
14:10
10m
Talk
Validity-Preserving Delta Debugging via Generator Trace Reduction
Journal-First
Luyao Ren Peking University, Xing Zhang Peking University, Ziyue Hua Peking University, Yanyan Jiang Nanjing University, Xiao He Bytedance, Yingfei Xiong Peking University, Tao Xie Peking University
14:20
10m
Talk
Execution-Aware Program Reduction for WebAssembly via Record and Replay
Research Papers
Doehyun Baek University of Stuttgart, Daniel Lehmann Google, Germany, Ben L. Titzer Carnegie Mellon University, Sukyoung Ryu KAIST, Michael Pradel CISPA Helmholtz Center for Information Security
Pre-print
14:30
10m
Talk
DebCovDiff: Differential Testing of Coverage Measurement Tools on Real-World Projects
Research Papers
Wentao Zhang University of Illinois Urbana-Champaign, Jinghao Jia University of Illinois Urbana-Champaign, Erkai Yu University of Illinois Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign
Media Attached
14:40
10m
Talk
DRIFT: Debug-based Trace Inference for Firmware Testing
Research Papers
Changming Liu Northeastern University, Alejandro Mera Northeastern University, Meng Xu University of Waterloo, Engin Kirda Northeastern University
14:50
10m
Talk
Enhancing Differential Testing With LLMs For Testing Deep Learning Libraries
Journal-First
Meiziniu LI The Hong Kong University of Science and Technology, Dongze Li The Hong Kong University of Science and Technology, Jianmeng Liu The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Yongqiang Tian Monash University, Shing-Chi Cheung Hong Kong University of Science and Technology
15:00
10m
Talk
Unit Test Update through LLM-Driven Context Collection and Error-Type-Aware Refinement
Research Papers
Yuanhe Zhang Zhejiang University, Zhiquan Yang Zhejiang University, Shengyi Pan Zhejiang University, Zhongxin Liu Zhejiang University
15:10
10m
Talk
Metamorphic Testing for Audio Content Moderation Software
Research Papers
Wenxuan Wang Hong Kong University of Science and Technology, Yongjiang Wu The Chinese University of Hong Kong, Junyuan Zhang The Chinese University of Hong Kong, Shuqing Li The Chinese University of Hong Kong, Yun Peng The Chinese University of Hong Kong, Wenting Chen City University of Hong Kong, Shuai Wang Hong Kong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong
15:20
10m
Talk
Comprehend, Imitate, and then Update: Unleashing the Power of LLMs in Test Suite Evolution
Research Papers
Tangzhi Xu Nanjing University, Jianhan Liu Nanjing University, Yuan Yao Nanjing University, Cong Li ETH Zurich, Feng Xu Nanjing University, Xiaoxing Ma Nanjing University
14:00 - 15:30
TranslationResearch Papers / Journal-First at Grand Hall 2
Chair(s): Saikat Dutta Cornell University
14:00
10m
Talk
Enhancing LLM to Decompile Optimized PTX to Readable CUDA for Tensor Programs
Research Papers
Xinyu Sun University of Science and Technology of China, Fugen Tang University of Science and Technology of China, Yu Zhang University of Science and Technology of China, Han Shen Kuaishou Technology, Chengru Song Kuaishou Technology, Di Zhang Kuaishou Technology
14:10
10m
Talk
Forcrat: Automatic I/O API Translation from C to Rust via Origin and Capability Analysis
Research Papers
14:20
10m
Talk
Polyglot: An Extensible Framework to Benchmark Code Translation with LLMs
Research Papers
Marco Vieira University of North Carolina at Charlotte, Priyam Ashish Shah University of North Carolina at Charlotte, Bhavain Shah University of North Carolina at Charlotte, Rrezarta Krasniqi University of North Carolina at Charlotte
14:30
10m
Talk
RFCScope: Detecting Logical Ambiguities in Internet Protocol Specifications
Research Papers
Mrigank Pawagi Indian Institute of Science, Bengaluru, Lize Shao Rice University, USA, Hyeonmin Lee University of Virginia, Yixin Sun University of Virginia, Wenxi Wang University of Virgina
Pre-print Media Attached File Attached
14:40
10m
Talk
Vision to Specification: Automating the Transition from Conceptual Features to Functional Requirements
Journal-First
Xiaoli Lian Beihang University, China
14:50
10m
Talk
RustAssure: Differential Symbolic Testing for LLM-Transpiled C-to-Rust Code
Research Papers
Yubo Bai University of California, Davis, Tapti Palit University of California, Davis
15:00
10m
Talk
SPEC2CODE: Mapping Software Specification to Function-Level Code Implementation
Research Papers
Yuekun Wang Singapore Management University, Lili Quan Tianjin University, Xiaofei Xie Singapore Management University, Junjie Wang Tianjin University, Jianjun Chen Tsinghua University
15:10
10m
Talk
RustRepoTrans: Repository-level Context Code Translation Benchmark Targeting Rust
Research Papers
Guangsheng Ou Sun Yat-sen University, Mingwei Liu Sun Yat-Sen University, Yuxuan Chen , Yanlin Wang Sun Yat-sen University, Xin Peng Fudan University, Zibin Zheng Sun Yat-sen University
Pre-print
15:20
10m
Talk
DLBENCH: A Comprehensive Benchmark for SQL Translation with Large Language Models
Research Papers
Li Lin Xiamen University, Hongqiao Chen School of Informatics, Xiamen University, Qinglin Zhu School of Informatics, Xiamen University, Liehang Chen School of Informatics, Xiamen University, Linlong Tang School of Informatics, Xiamen University, Rongxin Wu Xiamen University
14:00 - 15:30
Formal Method & Verification 1Research Papers at Grand Hall 3
Chair(s): Nazareno Aguirre University of Rio Cuarto/CONICET, Argentina, and Guangdong Technion-Israel Institute of Technology, China
14:00
10m
Talk
ScaleCirc: Scaling the Analysis over Circom Circuits
Research Papers
Jinan Jiang The Hong Kong Polytechnic University, Haoran Qin The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University
14:10
10m
Talk
Improving NLSAT for Nonlinear Real Arithmetic
Research Papers
Zhonghan Wang Institute of Software, Chinese Academy of Sciences
Pre-print
14:20
10m
Talk
Bridging Natural Language and Formal Specification - Automated Translation of Software Requirements to LTL via Hierarchical Semantics Decomposition Using LLMsACM SIGSOFT Distinguished Paper Award
Research Papers
Zhi Ma Xidian University, Cheng Wen Xidian University, Zhexin Su Xidian University, Xiao Liang Xidian University, Cong Tian Xidian University, Shengchao Qin Xidian University, Mengfei Yang China Academy of Space Technology
Link to publication DOI Pre-print
14:30
10m
Talk
Diagnosing Performance Differences in Model Checkers via Runtime-Guided Problem Generation
Research Papers
Yibo Dong National University of Singapore, Yicong Xu East China Normal University, Wenjing Deng East China Normal University, Yu Chen Chuzhou University, Xiaoyu Zhang East China Normal University, Jianwen Li East China Normal University, China, Chengyu Zhang Loughborough University, Geguang Pu East China Normal University, China
14:40
10m
Talk
VERT: Polyglot Verified Equivalent Rust Transpilation with Large Language Models
Research Papers
Aidan Z.H. Yang Carnegie Mellon University, Yoshiki Takashima Yale Law School, Brandon Paulsen Amazon, Joey Dodds Amazon, Daniel Kroening Amazon
14:50
10m
Talk
Agentic Specification Generator for Move Programs
Research Papers
Yu-Fu Fu Georgia Institute of Technology, Meng Xu University of Waterloo, Taesoo Kim Georgia Institute of Technology
Pre-print
15:00
10m
Talk
How Big is the Automaton? Certified Lower Bounds on the Size of Presburger DFAs
Research Papers
Nicolas Amat ONERA - The French Aerospace Lab, Pierre Ganty IMDEA Software Institute, Spain, Alessio Mansutti IMDEA Software Institute
15:10
10m
Talk
Non-termination Witnesses and their Validation
Research Papers
Zsófia Ádám Department of Measurement and Information Systems, Budapest University of Technology and Economics, Paulína Ayaziová Masaryk University, Czechia, Levente Bajczi Budapest University of Technology and Economics, Dirk Beyer LMU Munich, Marek Jankola LMU Munich, Marian Lingsch-Rosenfeld LMU Munich, Jan Strejcek Masaryk University
Link to publication
15:20
10m
Talk
PAT-Agent: Autoformalization for Model Checking
Research Papers
Xinyue Zuo National University of Singapore, Yifan Zhang National University of Singapore, Hongshu Wang National University of Singapore, Yufan Cai National University of Singapore, Zhe Hou Griffith University, Jing Sun School of Computer Science, University of Auckland, Jin Song Dong National University of Singapore
14:00 - 15:30
Human & Social Aspects 1Research Papers / Journal-First at Grand Hall 4
Chair(s): Julia Rubin The University of British Columbia
14:00
10m
Talk
Why AI Agents Still Need You: Findings from Developer-Agent Collaborations in the Wild
Research Papers
Aayush Kumar Microsoft, Yasharth Bajpai Microsoft, Sumit Gulwani Microsoft, Gustavo Soares Microsoft, Emerson Murphy-Hill Microsoft
14:10
10m
Talk
The Cost of Downgrading Build Systems: A Case Study of Kubernetes
Research Papers
Gareema Ranjan University of Waterloo, Mahmoud Alfadel University of Calgary, Gengyi Sun University of Waterloo, Shane McIntosh University of Waterloo
Pre-print
14:20
10m
Talk
Democratizing the Cryptocurrency Ecosystem by Just-In-Time Transformation of Mining Programs
Research Papers
Wei Liu Nanjing University, Zhenhua Li Tsinghua University, Feng Qian University of Southern California, Feiyu Jin Tsinghua University, Hao Lin Tsinghua University, Yannan Zheng Ant Group, Bo Xiao Ant Group, Xiaokang Qin Ant Group, Tianyin Xu University of Illinois at Urbana-Champaign
14:30
10m
Talk
Advancing Automated Ethical Profiling in SE: a Zero-Shot Evaluation of LLM Reasoning
Research Papers
Patrizio Migliarini University of L'Aquila, Italy, Mashal Afzal Memon University of L’Aquila, Italy, Marco Autili University of L'Aquila, Italy, Paola Inverardi Gran Sasso Science Institute
Pre-print
14:40
10m
Talk
The Impact of the COVID-19 Pandemic on Women’s Contribution to Public Code
Journal-First
Annalí Casanueva Ifo Institute, Big Data Junior Research Group, Munich, Germany, Davide Rossi University of Bologna, Théo Zimmermann Télécom Paris, Polytechnic Institute of Paris, Stefano Zacchiroli LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France
Link to publication DOI Pre-print
14:50
10m
Talk
Understanding Feature Request Practice on GitHub via a Large-Scale Empirical Study
Research Papers
Jiajun Li Nanjing University of Aeronautics and Astronautics, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Minxue Pan Nanjing University, Yu Zhou Nanjing University of Aeronautics and Astronautics
15:00
10m
Talk
Interaction2Code: Benchmarking MLLM-based Interactive Webpage Code Generation from Interactive Prototyping
Research Papers
Jingyu Xiao The Chinese University of Hong Kong, Yuxuan Wan The Chinese University of Hong Kong, Yintong Huo Singapore Management University, Singapore, Zixin Wang The Chinese University of Hong Kong, Xinyi Xu The Chinese University of Hong Kong, Wenxuan Wang Hong Kong University of Science and Technology, Zhiyao Xu Tsinghua University, Yuhang Wang Southwest University, Michael Lyu The Chinese University of Hong Kong
15:10
10m
Talk
Engineering Digital Systems for Humanity: a Research Roadmap
Journal-First
Marco Autili University of L'Aquila, Italy, Martina De Sanctis Gran Sasso Science Institute, Paola Inverardi Gran Sasso Science Institute, Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy
15:20
10m
Talk
Multi-dimensional Assessment of CrowdSourced Testing Reports via LLMs
Research Papers
Yue Wang NanJing University, Yuan Zhao Laboratory of Data Intelligence and Interdisciplinary Innovation, Nanjing University, Shengcheng Yu Technical University of Munich, Zhenyu Chen Nanjing University
14:00 - 15:30
Software ProcessResearch Papers / Journal-First at Grand Hall 5
Chair(s): Carol Hanna University College London
14:00
10m
Talk
LAURA: Enhancing Code Review Generation with Context-Enriched Retrieval-Augmented LLM
Research Papers
Yuxin Zhang Beijing Institute of Technology, Yuxia Zhang Beijing Institute of Technology, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Yanjie Jiang Peking University, Hui Liu Beijing Institute of Technology
14:10
10m
Talk
AlertGuardian: Intelligent Alert Life-Cycle Management for Large-scale Cloud Systems
Research Papers
Guangba  Yu The Chinese University of Hong Kong, Genting Mai Sun Yat-sen University, Rui Wang Tencent, Ruipeng Li Tencent, Pengfei Chen Sun Yat-sen University, Long Pan Tencent, Ruijie Xu Tencent
Pre-print
14:20
10m
Talk
SPICE : An Automated SWE-Bench Labeling Pipeline for Issue Clarity, Test Coverage, and Effort Estimation
Research Papers
Aaditya Bhatia Queen's University, Gustavo A. Oliva Centre for Software Excellence, Huawei Canada, Gopi Krishnan Rajbahadur Centre for Software Excellence, Huawei, Canada, Haoxiang Zhang Huawei, Yihao Chen Center for Software Excellence, Huawei Canada, Zhilong Chen Center for Software Excellence, Huawei Canada, Arthur Leung Center for Software Excellence, Huawei Canada, Dayi Lin Centre for Software Excellence, Huawei Canada, Boyuan Chen Centre for Software Excellence, Huawei Canada, Ahmed E. Hassan Queen’s University
14:30
10m
Talk
Managing the variability of a logistics robotic system
Journal-First
Kentaro Yoshimura Hitachi, Ltd., Yuta Yamauchi Hitachi, Ltd., Hideo Takahashi Hitachi, Ltd.
14:40
10m
Talk
Sprint2Vec: A Deep Characterization of Sprints in Iterative Software Development
Journal-First
Morakot Choetkiertikul Mahidol University, Thailand, Peerachai Banyongrakkul Mahidol University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Suppawong Tuarob Mahidol University, Hoa Khanh Dam University of Wollongong, Thanwadee Sunetnanta Mahidol University
14:50
10m
Talk
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes
Journal-First
Kashumi Madampe Monash University, Australia, Rashina Hoda Monash University, John Grundy Monash University
15:00
10m
Talk
Rechecking Recheck Requests in Continuous Integration: An Empirical Study of OpenStackACM SIGSOFT Distinguished Paper Award
Research Papers
Yelizaveta Brus University of Waterloo, Rungroj Maipradit University of Waterloo, Earl T. Barr University College London, Shane McIntosh University of Waterloo
15:10
10m
Talk
An LLM-based multi-agent framework for agile effort estimation
Research Papers
Long Bui University of Wollongong, Hoa Khanh Dam University of Wollongong, Rashina Hoda Monash University
Pre-print
15:20
10m
Talk
From Characters to Structure: Rethinking Real-Time Collaborative Programming Models
Research Papers
Leon Freudenthaler FH Campus Wien, Bernhard Taufner FH Campus Wien, Karl M. Göschka TU Wien
14:00 - 15:30
Code Generation 1Research Papers / Journal-First at Vista
Chair(s): Zhongxin Liu Zhejiang University
14:00
10m
Talk
QuanBench: Benchmarking Quantum Code Generation with Large Language Models
Research Papers
Xiaoyu Guo Kyushu University, Minggu Wang Kyushu University, Jianjun Zhao Kyushu University
14:10
10m
Talk
Token Sugar: Making Source Code Sweeter for LLMs through Token-Efficient Shorthand
Research Papers
Zhensu Sun Singapore Management University, Chengran Yang Singapore Management University, Singapore, Xiaoning Du Monash University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Li Li Beihang University, David Lo Singapore Management University
14:20
10m
Talk
FGIT: Fault-Guided Fine-Tuning for Code Generation
Research Papers
Lishui Fan Zhejiang University, Zhongxin Liu Zhejiang University, Haoye Wang Hangzhou City University, Lingfeng Bao Zhejiang University, Xin Xia Zhejiang University, Shanping Li Zhejiang University
14:30
10m
Talk
Mixture-of-Experts Low-Rank Adaptation for Multilingual Code Summarization
Research Papers
Tianchen Yu School of Software Engineering, South China University of Technology, Li Yuan School of Software Engineering, South China University of Technology, Guangzhou, China, Hailin Huang South China University of Technology, Jiexin Wang South China University of Technology, Yi Cai School of Software Engineering, South China University of Technology, Guangzhou, China
14:40
10m
Talk
EfficientEdit: Accelerating Code Editing via Edit-Oriented Speculative Decoding
Research Papers
Peiding Wang Beihang university, Li Zhang Beihang University, Fang Liu Beihang University, Yinghao Zhu Beihang University, Wang Xu Tsinghua University, Lin Shi Beihang University, Xiaoli Lian Beihang University, China, Minxiao Li Beihang university, Bo Shen Huawei Cloud Computing Technologies Co., Ltd., Binzhang Fu Huawei Technologies, n.n.
Pre-print
14:50
10m
Talk
Bias Testing and Mitigation in LLM-based Code Generation
Journal-First
Dong Huang The University of Hong Kong, Jie M. Zhang King's College London, Qingwen Bu Shanghai Jiao Tong University, Xiaofei Xie Singapore Management University, Junjie Chen Tianjin University, Heming Cui University of Hong Kong
15:00
10m
Talk
FastCoder: Accelerating Repository-level Code Generation via Efficient Retrieval and Verification
Research Papers
Qianhui Zhao Beihang University, Li Zhang Beihang University, Fang Liu Beihang University, Xiaoli Lian Beihang University, China, Meng Qiaoyuanhe Beihang University, Ziqian Jiao Beihang University, Zetong Zhou Beihang University, Jia Li , Lin Shi Beihang University
Pre-print
15:10
10m
Talk
AlignCoder: Aligning Retrieval with Target Intent for Repository-Level Code Completion
Research Papers
Tianyue Jiang Sun Yat-sen University, Yanli Wang Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Daya Guo , Ensheng Shi Huawei, Yuchi Ma Huawei Cloud Computing Technologies, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
15:20
10m
Talk
Effectiveness of symmetric metamorphic relations on validating the stability of code generation LLM
Journal-First
Chan Pak Yuen Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong, China, Jacky Keung City University of Hong Kong, Zhen Yang Shandong University
15:30 - 16:00
15:30
30m
Coffee break
Break
Catering

Tue 18 Nov

Displayed time zone: Seoul change

09:00 - 18:00
Quiet RoomCatering at Ida 1
09:00
9h
Other
Quiet Room
Catering

09:00 - 18:00
Prayer RoomCatering at Ida 2
09:00
9h
Other
Prayer Room
Catering

09:00 - 09:30
MIP Award 1MIP Award at Vista
Chair(s): David Lo Singapore Management University
09:00
30m
Talk
Deep Learning Code Fragments for Code Clone Detection
MIP Award
Martin White Booz Allen Hamilton, Michele Tufano Google, Christopher Vendome Miami University, Denys Poshyvanyk William & Mary
DOI
10:30 - 11:00
10:30
30m
Coffee break
Break
Catering

11:00 - 12:30
Code Generation 2Research Papers / Journal-First at Grand Hall 1
Chair(s): Jia Li Tsinghua University
11:00
10m
Talk
Coverage-Based Harmfulness Testing for LLM Code Transformation
Research Papers
Honghao Tan Concordia University, Haibo Wang Concordia University, Diany Pressato Concordia University, Yisen Xu Software PErformance, Analysis, and Reliability (SPEAR) lab, Concordia University, Montreal, Canada, Shin Hwei Tan Concordia University
11:10
10m
Talk
RealisticCodeBench: Towards More Realistic Evaluation of Large Language Models for Code Generation
Research Papers
Xiao Yu Zhejiang University, Haoxuan Chen Wuhan University of Technology, Lei Liu Xi’an Jiaotong University, Xing Hu Zhejiang University, Jacky Keung City University of Hong Kong, Xin Xia Zhejiang University
11:20
10m
Talk
Code-DiTing: Automatic Evaluation of Code Generation without References or Test Cases
Research Papers
Guang Yang , Yu Zhou Nanjing University of Aeronautics and Astronautics, Xiang Chen Nantong University, Wei Zheng Northwestern Polytechnical University, Xing Hu Zhejiang University, Xin Zhou Singapore Management University, Singapore, David Lo Singapore Management University, Taolue Chen Birkbeck, University of London
Pre-print
11:30
10m
Talk
An Agent-based Evaluation Framework for Complex Code Generation
Research Papers
Xinchen Wang Harbin Institute of Technology, Pengfei Gao ByteDance, Chao Peng ByteDance, Ruida Hu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Shenzhen
11:40
10m
Talk
PseudoFix: Refactoring Distorted Structures in Decompiled C Pseudocode
Research Papers
Gangyang Li University of Science and Technology of China, Xiuwei Shang University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, junqi zhang University of Science and Technology of China, Li Hu , Xu Zhu University of Science and Technology of China, Weiming Zhang University of Science and Technology of China, Nenghai Yu School of Cyber Security, University of Science and Technology of China
11:50
10m
Talk
Evaluating and Improving Framework-based Parallel Code Completion with Large Language Models
Research Papers
Ke Liu , Qinglin Wang Shandong Normal University, Xiang Chen Nantong University, Guang Yang , YiGui Feng National University of Defense Technology, Gencheng Liu National University of Defense Technology, Jie Liu Institute of Software, Chinese Academy of Sciences
12:00
10m
Talk
Variational Prefix Tuning for diverse and accurate code summarization using pre-trained language models
Journal-First
Junda Zhao Department of Mechanical and Industrial Engineering, University of Toronto, Yuliang Song Department of Mechanical and Industrial Engineering, University of Toronto, Eldan Cohen Department of Mechanical and Industrial Engineering, University of Toronto
12:10
10m
Talk
Effective Code Membership Inference for Code Completion Models via Adversarial Prompts
Research Papers
Yuan Jiang Harbin Institute of Technology, Zehao Li Harbin Institute of Technology, Shan Huang Harbin Institute of Technology, Christoph Treude Singapore Management University, Xiaohong Su Harbin Institute of Technology, Tiantian Wang Harbin Institute of Technology
12:20
10m
Talk
LongCodeZip: Compress Long Context for Code Language Models
Research Papers
Yuling Shi Shanghai Jiao Tong University, Yichun Qian Stanford University, Hongyu Zhang Chongqing University, Beijun Shen Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University
Pre-print Media Attached
11:00 - 12:30
Fault LocalizationResearch Papers / Journal-First at Grand Hall 2
Chair(s): Rui Abreu Faculty of Engineering of the University of Porto, Portugal
11:00
10m
Talk
FaultSeeker: LLM-Empowered Framework for Blockchain Transaction Fault Localization
Research Papers
Kairan Sun Nanyang Technological University, Zhengzi Xu Imperial Global Singapore, Kaixuan Li Nanyang Technological University, Lyuye Zhang Nanyang Technological University, Yuqiang Sun Nanyang Technological University, Liwei Tan MetaTrust Labs, Yang Liu Nanyang Technological University
11:10
10m
Talk
FlexFL: Flexible and Effective Fault Localization With Open-Source Large Language Models
Journal-First
Chuyang Xu Zhejiang University, Zhongxin Liu Zhejiang University, Xiaoxue Ren Zhejiang University, Gehao Zhang Ant Group, Ming Liang Ant Group, David Lo Singapore Management University
11:20
10m
Talk
LLM-Based Identification of Null Pointer Exception Patches
Research Papers
Tahir Ullah Beijing Institute of Technology, Waseem Akram Beijing Institute of Technology, Fiza Khaliq Beijing Institute of Technology, Hui Liu Beijing Institute of Technology
11:30
10m
Talk
SpectAcle: Fault Localisation of AI-Enabled CPS by Exploiting Sequences of DNN Controller Inferences
Journal-First
Deyun Lyu National Institute of Informatics, Zhenya Zhang Kyushu University, Paolo Arcaini National Institute of Informatics , Xiao-Yi Zhang University of Science and Technology Beijing, Fuyuki Ishikawa National Institute of Informatics, Jianjun Zhao Kyushu University
Link to publication DOI
11:40
10m
Talk
Sifting Truth from Coincidences: A Two-Stage Positive and Unlabeled Learning Model for Coincidental Correctness Detection
Research Papers
Chunyan Liu Chongqing University, Huan Xie Chongqing University, Yan Lei Chongqing University, Zhenyu Wu School of Big Data & Software Engineering, Chongqing University, Jinping Wang Chonqing University
11:50
10m
Talk
Let the Code Speak: Incorporating Program Dynamic State for Better Method-Level Fault Localization
Research Papers
Yihao Qin , Shangwen Wang National University of Defense Technology, Bo Lin National University of Defense Technology, Xin Peng , Sheng Ouyang National University of Defense Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology
12:00
10m
Talk
Issue Localization via LLM-Driven Iterative Code Graph Searching
Research Papers
Zhonghao Jiang Zhejiang University, Xiaoxue Ren Zhejiang University, Meng Yan Chongqing University, Wei Jiang Ant Group, Yong Li Ant Group, Zhongxin Liu Zhejiang University
12:10
10m
Talk
Hypergraph Neural Network-based Multi-Granular Root Cause Localization for Microservice Systems
Research Papers
Yaxiao Li Xidian University, Lu Wang Xidian University, Chenxi Zhang Xidian University, Qingshan Li Xidian University, Siming Rong Xidian University, Baiyang Wen Xidian University, Xuyang Li Purdue University, Kun Ma Xidian University, Quanwei Du Xidian University, KeYang Li Xidian University, Lingfeng Pan Xidian University, Xinyue Li Peking University, MingXuan Hui Xidian University
12:20
10m
Talk
Explainable Fault Localization for Programming Assignments via LLM-Guided Annotation
Research Papers
Fang Liu Beihang University, Tianze Wang Beihang University, Li Zhang Beihang University, Zheyu Yang Beihang University, Jing Jiang Beihang University, Zian Sun Beihang University
Pre-print
11:00 - 12:30
Formal Method & Verification 2Research Papers at Grand Hall 3
Chair(s): Dirk Beyer LMU Munich
11:00
10m
Talk
SMTgazer: Learning to Schedule SMT Algorithms via Bayesian Optimization
Research Papers
Chuan Luo Beihang University, Shaoke Cui Beihang University, Jianping Song Beihang University, Xindi Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China, Wei Wu Central South University; Xiangjiang Laboratory, Chanjuan Liu Dalian University of Technology, Shaowei Cai Institute of Software at Chinese Academy of Sciences, Chunming Hu Beihang University
11:10
10m
Talk
Efficient and Verifiable Proof Logging for MaxSAT SolvingACM SIGSOFT Distinguished Paper Award
Research Papers
Raoul van Doren ETH Zurich, Timos Antonopoulos Yale University, Ruzica Piskac Yale University
11:20
10m
Talk
Destabilizing Neurons to Generate Challenging Neural Network Verification Benchmarks
Research Papers
Linhan Li George Mason University, ThanhVu Nguyen George Mason University
11:30
10m
Talk
RELIA: Accelerating Analysis of Cloud Access Control Policies
Research Papers
Dan Wang Xi'an Jiaotong University, Peng Zhang Xi'an Jiaotong University, Zhenrong Gu Xi'an Jiaotong University, Weibo Lin Huawei Cloud, Shibiao Jiang Huawei Cloud, Zhu He Huawei Cloud, Xu Du Huawei Cloud, Longfei Chen Huawei Cloud, Jun Li Huawei, Xiaohong Guan Xi'an Jiaotong University
11:40
10m
Talk
Evolution-Aware Heuristics for GR(1) Realizability Checking
Research Papers
Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University, Jan Oliver Ringert Bauhaus-University Weimar
Pre-print
11:50
10m
Talk
Programmers’ Visual Attention on Function Call Graphs During Code SummarizationACM SIGSOFT Distinguished Paper Award
Research Papers
Samantha McLoughlin Vanderbilt University, Zachary Karas Vanderbilt University, Robert Wallace University of Notre Dame, Aakash Bansal Louisiana State University, Collin McMillan University of Notre Dame, Yu Huang Vanderbilt University
12:00
10m
Talk
LLM-Assisted Synthesis of High-Assurance C Programs
Research Papers
Prasita Mukherjee Purdue University, Minghai Lu Purdue University, Benjamin Delaware Purdue University
Pre-print
12:10
10m
Talk
Faster Runtime Verification during Testing via Feedback-Guided Selective MonitoringACM SIGSOFT Distinguished Paper Award
Research Papers
Shinhae Kim Cornell University, Saikat Dutta Cornell University, Owolabi Legunsen Cornell University
12:20
10m
Talk
Uncovering Discrimination Clusters: Quantifying and Explaining Systematic Fairness Violations
Research Papers
Ranit Debnath Akash University of Illinois Chicago, Ashish Kumar Pennsylvania State University, Verya Monjezi University of Illinois Chicago, Ashutosh Trivedi University of Colorado Boulder, Gang (Gary) Tan Pennsylvania State University, Saeid Tizpaz-Niari University of Illinois Chicago
Link to publication DOI Pre-print Media Attached
11:00 - 12:30
Security 1Research Papers / Journal-First at Grand Hall 5
Chair(s): Yunho Kim Hanyang University
11:00
10m
Talk
Vulnerability-Affected Versions Identification: How Far Are We?
Research Papers
Xingchu Chen Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Chengwei Liu Nanyang Technological University, Jialun Cao Hong Kong University of Science and Technology, Yang Xiao Chinese Academy of Sciences, Xinyue Cai Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingyi Shi Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, tianqi sun Institute of Information Engineering, Chinese Academy of Sciences, Haiming Chen Institute of Software, Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences
11:10
10m
Talk
LOSVER: Line-Level Modifiability Signal-Guided Vulnerability Detection and ClassificationACM SIGSOFT Distinguished Paper Award
Research Papers
Doha Nam Korea Advanced Institute of Science and Technology, Jongmoon Baik Korea Advanced Institute of Science and Technology
11:20
10m
Talk
VERCATION: Precise Vulnerable Open-source Software Version Identification based on Static Analysis and LLM
Journal-First
Yiran Cheng Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Ting Zhang Monash University, Lwin Khin Shar Singapore Management University, Shouguo Yang Zhongguancun Laboratory, Beijing, China, Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, David Lo Singapore Management University, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
11:30
10m
Talk
Not Every Patch is an Island: LLM-Enhanced Identification of Multiple Vulnerability PatchesACM SIGSOFT Distinguished Paper Award
Research Papers
Yi Song School of Computer Science, Wuhan University, Dongchen Xie School of Cyber Science and Engineering, Wuhan University, Lin Xu School of Cyber Science and Engineering, Wuhan University, He Zhang School of Computer Science, Wuhan University, Chunying Zhou School of Computer Science, Wuhan University, Xiaoyuan Xie Wuhan University
11:40
10m
Talk
Vul-R2: A Reasoning LLM for Automated Vulnerability Repair
Research Papers
Xin-Cheng Wen Harbin Institute of Technology, Zirui Lin Harbin Institute of Technology, Shenzhen, Yijun Yang Tencent AI Lab, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Deheng Ye Tencent AI Lab
11:50
10m
Talk
DeepExploitor: LLM-Enhanced Automated Exploitation of DeepLink Attack in Hybrid Apps
Research Papers
Zhangyue Zhang Fudan University, Lei Zhang Fudan University, Zhibo Zhang Huazhong University of Science and Technology, Yongheng Liu Fudan University, Zhemin Yang Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
12:00
10m
Talk
Demystifying Cookie Sharing Risks in WebView-based Mobile App-in-app Ecosystems
Research Papers
Miao Zhang Beijing University of Posts and Telecommunications, Shenao Wang Huazhong University of Science and Technology, Guilin Zheng Beijing University of Posts and Telecommunications, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
12:10
10m
Talk
Hit The Bullseye On The First Shot: Improving LLMs Using Multi-Sample Self-Reward Feedback for Vulnerability Repair
Research Papers
Rui Jiao Xidian University, Yue Zhang Drexel University, Jinku Li Xidian University, Jianfeng Ma Xidian University
12:20
10m
Talk
Propagation-Based Vulnerability Impact Assessment for Software Supply Chains
Research Papers
Bonan Ruan National University of Singapore, Zhiwei Lin National University of Singapore, Jiahao Liu National University of Singapore, Chuqi Zhang National University of Singapore, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore
Pre-print
11:00 - 12:30
SE4AI & AI4SE 2Research Papers at Vista
Chair(s): Xiaoning Du Monash University
11:00
10m
Talk
Learning Project-wise Subsequent Code Edits via Interleaving Neural-based Induction and Tool-based Deduction
Research Papers
Chenyan Liu Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yuhuan Huang Shanghai Jiao Tong University, Jiaxin Chang Shanghai Jiao Tong University, Binhang Qi National University of Singapore, Bo Jiang Bytedance Network Technology, Zhiyong Huang National University of Singapore, Jin Song Dong National University of Singapore
11:10
10m
Talk
Coding-Fuse: Efficient Fusion of Code Pre‑Trained Models for Classification Tasks
Research Papers
Yu Zhao , Lina Gong Nanjing University of Aeronautics and Astronautic, Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, Yuchen Jin Nanjing University of Aeronautics and Astronautics, Mingqiang Wei Nanjing University of Aeronautics and Astronautics
11:20
10m
Talk
SE-Jury: An LLM-as-Ensemble-Judge Metric for Narrowing the Gap with Human Evaluation in SE
Research Papers
Xin Zhou Singapore Management University, Singapore, Kisub Kim DGIST, Ting Zhang Monash University, Martin Weyssow Singapore Management University, Luis F. Gomes Carnegie Mellon University, Guang Yang , Kui Liu Huawei, Xin Xia Zhejiang University, David Lo Singapore Management University
11:30
10m
Talk
iKnow: an Intent-Guided Chatbot for Cloud Operations with Retrieval-Augmented GenerationACM SIGSOFT Distinguished Paper Award
Research Papers
Junjie Huang The Chinese University of Hong Kong, Yuedong Zhong Sun Yat-sen University, Guangba  Yu The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Minzhi Yan HCC Lab, Huawei Cloud Computing Technology Co., Ltd, Wenfei Luan HCC Lab, Huawei Cloud Computing Technology Co., Ltd, Tianyu Yang HCC Lab, Huawei Cloud Computing Technology Co., Ltd, Rui Ren Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Michael Lyu The Chinese University of Hong Kong
11:40
10m
Talk
Aligning LLMs to Fully Utilize the Cross-file Context in Repository-level Code Completion
Research Papers
Jia Li Tsinghua University, Hao Zhu Peking University, Huanyu Liu , Xianjie Shi Peking University, He Zong aiXcoder, Yihong Dong Peking University, Kechi Zhang Peking University, China, Siyuan Jiang , Zhi Jin Peking University, Ge Li Peking University
11:50
10m
Talk
From Sparse to Structured: A Diffusion-Enhanced and Feature-Aligned Framework for Coincidental Correctness Detection
Research Papers
Huan Xie Chongqing University, Chunyan Liu Chongqing University, Yan Lei Chongqing University, Zhenyu Wu School of Big Data & Software Engineering, Chongqing University, Jinping Wang Chonqing University
12:00
10m
Talk
Watson: A Cognitive Observability Framework for the Reasoning of LLM-Powered Agents
Research Papers
Benjamin Rombaut Centre for Software Excellence, Huawei Canada, Sogol Masoumzadeh Mcgill University, Kirill Vasilevski Huawei Canada, Dayi Lin Centre for Software Excellence, Huawei Canada, Ahmed E. Hassan Queen’s University
12:10
10m
Talk
Understanding Software Engineering Agents: A Study of Thought-Action-Result TrajectoriesACM SIGSOFT Distinguished Paper Award
Research Papers
Islem BOUZENIA University of Stuttgart, Michael Pradel CISPA Helmholtz Center for Information Security
Pre-print
12:20
10m
Talk
Triangle: Empowering Incident Triage with Multi-Agent
Research Papers
Zhaoyang Yu Tsinghua University, Aoyang Fang Chinese University of Hong Kong, Shenzhen, Minghua Ma Microsoft, Jaskaran Singh Walia Microsoft, Chaoyun Zhang Microsoft, Shu Chi Tsinghua University, Ze Li Microsoft Azure, Murali Chintalapati Microsoft Azure, Xuchao Zhang Microsoft, Rujia Wang Microsoft, Chetan Bansal Microsoft Research, Saravan Rajmohan Microsoft, Qingwei Lin Microsoft, Shenglin Zhang Nankai University, Dan Pei Tsinghua University, Pinjia He Chinese University of Hong Kong, Shenzhen
12:30 - 14:00
12:30
90m
Lunch
Lunch
Catering

14:00 - 15:30
Program Analysis 1Research Papers / Journal-First at Grand Hall 1
Chair(s): Chaiyong Ragkhitwetsagul Mahidol University
14:00
10m
Talk
Exploring Static Taint Analysis in LLMs: A Dynamic Benchmarking Framework for Measurement and Enhancement
Research Papers
Haoran Zhao Fudan University, Lei Zhang Fudan University, Keke Lian Fudan University, Fute Sun Fudan University, Bofei Chen Fudan University, Yongheng Liu Fudan University, Zhiyu Wu Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
14:10
10m
Talk
EPSO: A Caching-Based Efficient Superoptimizer for BPF Bytecode
Research Papers
Qian Zhu Nanjing University, Yuxuan Liu Nanjing University, Ziyuan Zhu Nanjing University, Shangqing Liu Nanjing University, Lei Bu Nanjing University
14:20
10m
Talk
GNNContext: GNN-based Code Context Prediction for Programming Tasks
Journal-First
Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, Shun Liu Zhejiang University, Kaiwen Yang Zhejiang University, David Lo Singapore Management University, Xiaohu Yang Zhejiang University
14:30
10m
Talk
R3-Bench: Reproducible Real-world Reverse Engineering Dataset for Symbol Recovery
Research Papers
Muzhi Yu Peking University and Alibaba Group, Zhengran Zeng Peking University, Wei Ye Peking University, Jinan Sun Peking University, Xiaolong Bai Alibaba Group, Shikun Zhang Peking University
14:40
10m
Talk
Protecting Source Code Privacy When Hunting Memory Bugs
Research Papers
Jielun Wu Nanjing University, Bing Shui Nanjing University, Hongcheng Fan Nanjing University, Shengxin Wu Nanjing University, Rongxin Wu Xiamen University, Yang Feng Nanjing University, Baowen Xu Nanjing University, Qingkai Shi Nanjing University
14:50
10m
Talk
Latra: A Template-Based Language-Agnostic Transformation Framework for Effective Program Reduction
Research Papers
Zhenyang Xu University of Waterloo, Yiran Wang University of Waterloo, Yongqiang Tian Monash University, Mengxiao Zhang University of Waterloo, Chengnian Sun University of Waterloo
15:00
10m
Talk
When Control Flows Deviate: Directed Grey-box Fuzzing with Probabilistic Reachability Analysis
Research Papers
Peihong Lin National University of Defense Technology, Pengfei Wang National University of Defense Technology, Xu Zhou National University of Defense Technology, Wei Xie University of Science and Technology of China, Xin Ren National University of Defense Technology, Kai Lu National University of Defense Technology, China
15:10
10m
Talk
EditFusion: Resolving Code Merge Conflicts via Edit Selection
Research Papers
Changxin Wang Nanjing University, Yiming Ma Nanjing University, Lei Xu Nanjing University, Weifeng Zhang Nanjing University of Posts and Telecommunications
15:20
10m
Talk
Detecting Semantic Clones of Unseen Functionality
Research Papers
Konstantinos Kitsios University of Zurich, Francesco Sovrano Collegium Helveticum, ETH Zurich, Switzerland; Department of Informatics, University of Zurich, Switzerland, Earl T. Barr University College London, Alberto Bacchelli University of Zurich
Pre-print
14:00 - 15:30
Fuzzing 1Research Papers / Journal-First at Grand Hall 2
Chair(s): Yanjie Zhao Huazhong University of Science and Technology
14:00
10m
Talk
RSFuzz: A Robustness-Guided Swarm Fuzzing Framework Based on Behavioral Constraints
Research Papers
Ruoyu Zhou School of Computer Science and Technology, Xidian University, Xi'an, China; Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China, Zhiwei Zhang School of Computer Science and Technology, Xidian University, Xi'an, China; Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China, Haocheng Han School of Computer Science and Technology, Xidian University, Xi'an, China; Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China, Xiaodong Zhang University of Chinese Academy of Science, Zehan Chen School of Computer Science and Technology, Xidian University, Xi’an, China; Shaanxi Key Laboratory of Network and System Security , Xidian University, Jun Sun Singapore Management University, Yulong Shen Xidian University, Dehai Xu Yiqiyin (Hangzhou) Technology Co., Ltd. Xi'an Branch, Xi'an, China
14:10
10m
Talk
DualFuzz: Detecting Vulnerability in Wi-Fi NICs through Dual-Directional FuzzingACM SIGSOFT Distinguished Paper Award
Research Papers
Yuanliang Chen Tsinghua University, Fuchen Ma Tsinghua University, Yanyang Zhao Tsinghua University, Yuanyi Li Shuimu Yulin Technology Co., Ltd, Yu Jiang Tsinghua University
14:20
10m
Talk
ORFuzz: Fuzzing the "Other Side" of LLM Safety – Testing Over-Refusal
Research Papers
Haonan Zhang Zhejiang University, Dongxia Wang Zhejiang University, Yi Liu Nanyang Technological University, Kexin Chen Zhejiang University, Jiashui Wang Zhejiang University, Xinlei Ying Ant Group, Long Liu Ant Group, Wenhai Wang Zhejiang University
Pre-print
14:30
10m
Talk
DNAFuzz: Descriptor-Aware Fuzzing for USB Drivers
Research Papers
Zhengshu Wang Hubei University, Peng He Hubei University, Fuchen Ma Tsinghua University, Yuanliang Chen Tsinghua University, Shuoshuo Duan Shuimu Yulin Technology Co., Ltd, Yiyuan Bai Shuimu Yulin Technology Co., Ltd, Yu Jiang Tsinghua University
14:40
10m
Talk
ARG: Testing Query Rewriters via Abstract Rule Guided Fuzzing
Research Papers
Dawei Li Beihang University, Yuxiao Guo Beihang University, Qifan Liu Beihang University, Jie Liang Beihang University, Zhiyong Wu Tsinghua University, China, Jingzhou Fu School of Software, Tsinghua University, Chi Zhang Tsinghua University, Yu Jiang Tsinghua University
14:50
10m
Talk
Algernon: A Flag-Guided Hybrid Fuzzer for Unlocking Hidden Program Paths
Research Papers
Peng Deng Fudan University, Lei Zhang Fudan University, Jingqi Long Fudan University, Wenzheng Hong Independent, Zhemin Yang Fudan University, Yuan Zhang Fudan University, Donglai Zhu Fudan University, Min Yang Fudan University
15:00
10m
Talk
Interleaved Learning and Exploration: A Self-Adaptive Fuzz Testing Framework for MLIR
Research Papers
Zeyu Sun Institute of Software, Chinese Academy of Sciences, Jingjing Liang East China Normal University, Weiyi Wang Institute of Software, Chinese Academy of Sciences, Chenyao Suo Tianjin University, Junjie Chen Tianjin University, Fanjiang Xu Institute of Software at Chinese Academy of Sciences
15:10
10m
Talk
WingMuzz: Blackbox Testing of IoT Protocols via Two-dimensional Fuzzing ScheduleACM SIGSOFT Distinguished Paper Award
Research Papers
Xiaogang Zhu Adelaide University, Enze Dai Swinburne University of Technology, Xiaotao Feng 360 Vulnerability Research Institute, Shaohua Wang Central University of Finance and Economics, Xin Xia Zhejiang University, Sheng Wen Swinburne University of Technology, Kwok-Yan Lam Nanyang Technological University, Singapore, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology
Link to publication
15:20
10m
Talk
Advanced White-Box Heuristics for Search-Based Fuzzing of REST APIs
Journal-First
Andrea Arcuri Kristiania University College and Oslo Metropolitan University, Man Zhang Beihang University, China, Juan Pablo Galeotti University of Buenos Aires
14:00 - 15:30
Maintenance & Evolution 1Research Papers / Journal-First at Grand Hall 3
Chair(s): Dongsun Kim Korea University
14:00
10m
Talk
Enhancing LLMs with Staged Grouping and Dehallucination for Header File DecompositionACM SIGSOFT Distinguished Paper Award
Research Papers
Yue Wang Peking University, Jiaxuan Sun Peking University, Yanzhen Zou Peking University, Bing Xie Peking University
14:10
10m
Research paper
Speculative Automated Refactoring of Imperative Deep Learning Programs to Graph Execution
Research Papers
Raffi Khatchadourian CUNY Hunter College, Tatiana Castro Vélez University of Puerto Rico, Rio Piedras Campus, Mehdi Bagherzadeh Oakland University, Nan Jia City University of New York (CUNY) Graduate Center, Anita Raja City University of New York (CUNY) Hunter College
Pre-print Media Attached File Attached
14:20
10m
Talk
An Empirical Study of Python Library Migration Using Large Language Models
Research Papers
Mohayeminul Islam University of Alberta, Ajay Jha North Dakota State University, May Mahmoud New York University Abu Dhabi, Ildar Akhmetov Northeastern University, Sarah Nadi New York University Abu Dhabi
Pre-print
14:40
10m
Talk
Demystifying the Evolution of Neural Networks with BOM Analysis: Insights from a Large-Scale Study of 55,997 GitHub Repositories
Research Papers
xiaoning ren , Yuhang Ye University of Science and Technology of China, Xiongfei Wu University of Luxembourg, Yueming Wu Huazhong University of Science and Technology, Yinxing Xue Institute of AI for Industries, Chinese Academy of Sciences
14:50
10m
Talk
Fact-Aligned and Template-Constrained Static Analyzer Rule Enhancement with LLMs
Research Papers
Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Ge Wen Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
15:00
10m
Talk
MCTS-Refined CoT: High-Quality Fine-Tuning Data for LLM-Based Repository Issue Resolution
Research Papers
Yibo Wang Northeastern University, Zhihao Peng Northeastern University, Ying Wang Northeastern University, Zhao Wei Tencent, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China
15:10
10m
Talk
Software Reconfiguration in Robotics
Journal-First
Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy, Sven Peldszus IT University of Copenhagen, Davide Brugali University of Bergamo, Italy, Daniel Strüber Chalmers | University of Gothenburg / Radboud University, Thorsten Berger Ruhr University Bochum
15:20
10m
Talk
CROSS2OH: Enabling Seamless Porting of C/C++ Software Libraries to OpenHarmony
Research Papers
Qian Zhang University of California at Riverside, Li Tsz On The Hong Kong University of Science and Technology, Ying Wang Northeastern University, Li Li Beihang University, Shing-Chi Cheung Hong Kong University of Science and Technology
14:00 - 15:30
Security 2Journal-First / Research Papers at Grand Hall 5
Chair(s): Saeid Tizpaz-Niari University of Illinois Chicago
14:00
10m
Talk
Towards Generalizable Instruction Vulnerability Prediction via LLM-Enhanced Code Representation
Research Papers
Bao Wen Nanjing University of Aeronautics and Astronautics, Jingjing Gu Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Yang Liu Nanyang Technological University, Pengfei Yu Nanjing University of Aeronautics and Astronautics, Yanchao Zhao Nanjing University of Aeronautics and Astronautics
14:10
10m
Talk
Interpretable Vulnerability Detection Reports
Research Papers
Claudia Mamede Carnegie Mellon University, Jose Campos FEUP & LASIGE, Claire Le Goues Carnegie Mellon University, Rui Abreu Faculty of Engineering of the University of Porto, Portugal
14:20
10m
Talk
Security Debt in LLM Agent Applications: A Measurement Study of Vulnerabilities and Mitigation Trade-offs
Research Papers
Zhuoxiang Shen Fudan University, Jiarun Dai Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
14:30
10m
Talk
Altered Histories in Version Control System Repositories: Evidence from the Trenches
Research Papers
Solal Rapaport Télécom Paris, Institut Polytechnique de Paris, Laurent Pautet Télécom Paris, Institut Polytechnique de Paris, Samuel Tardieu Télécom Paris, Institut Polytechnique de Paris, Stefano Zacchiroli LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France
Pre-print
14:40
10m
Talk
Lares: LLM-driven Code Slice Semantic Search for Patch Presence Testing
Research Papers
Siyuan Li University of Chinese Academy of Sciences & Institute of Information Engineering Chinese Academy of Sciences, China, Yaowen Zheng Institute of Information Engineering at Chinese Academy of Sciences, Hong Li Institute of Information Engineering at Chinese Academy of Sciences, Jingdong Guo Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Chunpeng Yan Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Weijie Wang Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Yimo Ren Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Hongsong Zhu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:50
10m
Talk
PoliCond: Condition-Aware Ontology-Driven LLMs for Privacy Policy Analysis
Research Papers
Yalin Feng Nanjing University, Yifei Lu State Key Laboratory for Novel Software Technology, Nanjing University, China, Minxue Pan Nanjing University
15:00
10m
Talk
Understanding Resource Injection Vulnerabilities in Kubernetes Ecosystems
Research Papers
Defang Bo Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Jie Lu Institute of Computing Technology of the Chinese Academy of Sciences, Feng Li Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Jingting Chen Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Jinchen Wang Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Chendong Yu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences
15:10
10m
Talk
LLM-Powered Static Binary Taint Analysis
Journal-First
Puzhuo Liu Ant Group & Tsinghua University, Chengnian Sun University of Waterloo, Yaowen Zheng Institute of Information Engineering at Chinese Academy of Sciences, Xuan Feng Independent Researcher, Chuan Qin Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Yuncheng Wang Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, UCAS Beijing, China, Zhenyang Xu University of Waterloo, Zhi Li Institute of Information Engineering, Chinese Academy of Sciences, China, Peng Di Ant Group & UNSW Sydney, Yu Jiang Tsinghua university, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
15:20
10m
Talk
Stealthy Backdoor Attack for Code Models
Journal-First
Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Bowen Xu North Carolina State University, Jie M. Zhang King's College London, Hong Jin Kang University of Sydney, Jieke Shi Singapore Management University, Junda He Singapore Management University, David Lo Singapore Management University
14:00 - 15:30
Smart ContractsResearch Papers at Grand Hall 6
Chair(s): Ningyu He Hong Kong Polytechnic University
14:00
10m
Talk
Leveraging Mixture-of-Experts Framework for Smart Contract Vulnerability Repair with Large Language Model
Research Papers
Hang Yuan Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Xizhi Hou Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lei Yu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Li Yang Institute of Software, Chinese Academy of Sciences, Jiayue Tang Institute of Software, CAS, Univ. of Chinese Academy of Sciences, Jiadong Xu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Yifei Liu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Fengjun Zhang Institute of Software, Chinese Academy of Sciences, China, Chun Zuo Sinosoft
14:10
10m
Talk
Why Is My Transaction Risky? Understanding Smart Contract Semantics and Interactions in the NFT Ecosystem
Research Papers
Yujing Chen Zhejiang University, Xuanming Liu Zhejiang University, Zhiyuan Wan Zhejiang University, Zuobin Wang Zhejiang University, David Lo Singapore Management University, Difan Xie Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Xiaohu Yang Zhejiang University
14:20
10m
Talk
Demystifying OpenZeppelin's Own Vulnerabilities and Analyzing Their Propagation in Smart Contracts
Research Papers
Han Liu The Hong Kong University of Science and Technology, Daoyuan Wu Lingnan University, Yuqiang Sun Nanyang Technological University, Shuai Wang Hong Kong University of Science and Technology, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University
14:30
10m
Talk
PROMFUZZ: Leveraging LLM-Driven and Bug-Oriented Composite Analysis for Detecting Functional Bugs in Smart Contracts
Research Papers
Xingshuang Lin Zhejiang University, Qinge Xie Georgia Institute of Technology, Binbin Zhao Zhejiang University, Yuan Tian , Saman Zonouz Georgia Institute of Technology, Na Ruan Shanghai Jiaotong University, Jiliang Li Xi'an Jiaotong University, Raheem Beyah Georgia Institute of Technology, Shouling Ji Zhejiang University
14:40
10m
Talk
VeriExploit: Automatic Bug Reproduction in Smart Contracts via LLMs and Formal Methods
Research Papers
Chenfeng Wei The University of Manchester, Shiyu Cai The University of Manchester, Yiannis Charalambous The University of Manchester, Tong Wu , Sangharatna Godboley NIT Warangal, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil
14:50
10m
Talk
SolContractEval: A Benchmark for Evaluating Contract-Level Solidity Code Generation
Research Papers
Zhifan Ye Zhejiang University, Jiachi Chen Sun Yat-sen University, Zhenzhe Shao Sun Yat-sen University, Lingfeng Bao Zhejiang University, Xiaohu Yang Zhejiang University, Zhongxin Liu Zhejiang University
15:00
10m
Talk
PrefGen: A Preference-Driven Methodology for Secure Yet Gas-Efficient Smart Contract Generation
Research Papers
Zhiyuan Peng Shanghai Jiao Tong University, Xin Yin Zhejiang University, Zijie Zhou China University of Petroleum (Beijing), Chenhao Ying Shanghai Jiao Tong University, Chao Ni Zhejiang University, Yuan Luo Shanghai Jiao Tong University
Pre-print
15:10
10m
Talk
Soleker: Uncovering Vulnerabilities in Solana Smart Contracts
Research Papers
Kunsong Zhao The Hong Kong Polytechnic University, Yunpeng Tian The Hong Kong Polytechnic University, Zuchao Ma The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University
15:20
10m
Talk
Have We Solved Access Control Vulnerability Detection in Smart Contracts? A Benchmark Study
Research Papers
Han Liu The Hong Kong University of Science and Technology, Daoyuan Wu Lingnan University, Yuqiang Sun Nanyang Technological University, Shuai Wang Hong Kong University of Science and Technology, Yang Liu Nanyang Technological University
14:00 - 15:30
Testing & Analysis 2Research Papers / Journal-First at Vista
Chair(s): Xiaoyin Wang University of Texas at San Antonio
14:00
10m
Talk
Quantum Circuit Mutants: Empirical Analysis and Recommendations
Journal-First
Eñaut Mendiluze Usandizaga Simula Research Laboratory, Norway, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Paolo Arcaini National Institute of Informatics
Link to publication DOI
14:10
10m
Talk
MET-MAPF: A Metamorphic Testing Approach for Multi-Agent Path Finding Algorithms
Journal-First
Xiao-Yi Zhang University of Science and Technology Beijing, Yang Liu Nanyang Technological University, Paolo Arcaini National Institute of Informatics , Mingyue Jiang Zhejiang Sci-Tech University, Zheng Zheng Beihang University
Link to publication DOI
14:20
10m
Talk
State Field Coverage: A Metric for Oracle Quality
Research Papers
Facundo Molina IMDEA Software Institute, Nazareno Aguirre University of Rio Cuarto/CONICET, Argentina, and Guangdong Technion-Israel Institute of Technology, China, Alessandra Gorla IMDEA Software Institute
Pre-print
14:30
10m
Talk
Do LLMs Generate Useful Test Oracles? An Empirical Study with an Unbiased Dataset
Research Papers
Davide Molinelli USI Lugano; Schaffhausen Institute of Technology, Luca Di Grazia University of St. Gallen, Alberto Martin-Lopez Software Institute - USI, Lugano, Michael D. Ernst University of Washington, Mauro Pezze Università della Svizzera italiana (USI) and Università degli Studi di Milano Bicocca
Media Attached File Attached
14:40
10m
Talk
Finding Safety Violations of AI-Enabled Control Systems through the Lens of Synthesized Proxy Programs
Journal-First
Jieke Shi Singapore Management University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Junda He Singapore Management University, Bowen Xu North Carolina State University, Dongsun Kim Korea University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University
Link to publication DOI Pre-print
14:50
10m
Talk
ZendDiff: Differential Testing of PHP Interpreter
Research Papers
Yuancheng Jiang National University of Singapore, Jianing Wang National University of Singapore, Qiange Liu Beihang University, Yeqi Fu National University of Singapore, Jian Mao Beihang University, Roland H. C. Yap National University of Singapore, Zhenkai Liang National University of Singapore
15:00
10m
Talk
SATORI: Static Test Oracle Generation for REST APIs
Research Papers
Juan C. Alonso Universidad de Sevilla, Alberto Martin-Lopez Software Institute - USI, Lugano, Sergio Segura SCORE Lab, I3US Institute, Universidad de Sevilla, Seville, Spain, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Antonio Ruiz-Cortés University of Seville
15:10
10m
Talk
Exact Inference for Quantum Circuits: A Testing Oracle for Quantum Software Stacks
Research Papers
Kanguk Lee KAIST, Jaemin Hong KAIST, Sukyoung Ryu KAIST
15:20
10m
Talk
Identifying inconsistent software defect predictions with symmetry metamorphic relation pattern
Journal-First
Chan Pak Yuen Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong, China, Jacky Keung City University of Hong Kong, Zhen Yang Shandong University
15:30 - 16:00
15:30
30m
Coffee break
Break
Catering

Wed 19 Nov

Displayed time zone: Seoul change

09:00 - 18:00
Quiet RoomCatering at Ida 1
09:00
9h
Other
Quiet Room
Catering

09:00 - 18:00
Prayer RoomCatering at Ida 2
09:00
9h
Other
Prayer Room
Catering

09:00 - 09:20
MIP Award 2MIP Award at Vista
Chair(s): Lars Grunske Humboldt-Universität zu Berlin
09:00
20m
Talk
Automated Test Input Generation for Android: Are We There Yet?
MIP Award
Shauvik Roy Choudhary Uber Technologies, Inc, Alessandra Gorla IMDEA Software Institute, Alessandro Orso University of Georgia, USA
DOI
10:30 - 11:00
10:30
30m
Coffee break
Break
Catering

11:00 - 12:30
Web & Mobile Systems 1Research Papers / Journal-First at Grand Hall 2
Chair(s): Jacques Klein University of Luxembourg
11:00
10m
Talk
Resolving Conditional Implicit Calls to Improve Static and Dynamic Analysis in Android Apps
Journal-First
Jordan Samhi University of Luxembourg, Luxembourg, René Just University of Washington, Michael D. Ernst University of Washington, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
11:10
10m
Talk
GlassWing: A Tailored Static Analysis Approach for Flutter Android Apps
Research Papers
Xiangyu Zhang DISSec, NDST, College of Cyber Science, Nankai University, China, Yucheng Su Intelligence and Offensive Defense Lab, Xiaohongshu Inc., China, Lingling Fan Nankai University, Miaoying Cai DISSec, NDST, College of Cyber Science, Nankai University, China, Sen Chen Nankai University
11:20
10m
Talk
Characterizing and Repairing Color-Related Accessibility Issues in Android Apps
Research Papers
Jiahao Gu Xiamen University, Huaxun Huang Xiamen University
11:30
10m
Talk
Generating Failure-Based Oracles to Support Testing of Reported Bugs in Android Apps
Research Papers
Jack Johnson University of Minnesota, Junayed Mahmud University of Central Florida, Oscar Chaparro William & Mary, Kevin Moran University of Central Florida, Mattia Fazzini University of Minnesota
11:40
10m
Talk
On the (In)Security of Non-resettable Device Identifiers in Custom Android Systems
Research Papers
Zikan Dong Beijing University of Posts and Telecommunications, Liu Wang Huazhong University of Science and Technology, Guoai Xu Harbin Institute of Technology, Shenzhen, Haoyu Wang Huazhong University of Science and Technology
11:50
10m
Talk
Don't Mess with Bro's Cheese! An Empirical Study of Resource Conflict in Android Multi-window
Research Papers
Chenkai Guo Nankai University, China, Huimin Zhao College of Cryptology and Cyber Science, Nankai University, Tianhong Wang College of Computer Science, Nankai University, Naipeng Dong The University of Queensland, Australia, Qingqing Dong College of Cryptology and Cyber Science, Nankai University, Jiarui Che College of Computer Science, Nankai University, Yaqiong Qiao College of Cryptology and Cyber Science, Nankai University, Xiangyang Luo State Key Laboratory of Mathematical Engineering and Advanced Computing, Zheli Liu Nankai University
12:00
10m
Talk
Profile Coverage: Using Android Compilation Profiles to Evaluate Dynamic Testing
Research Papers
Jakob Bleier TU Wien, Felix Kehrer TU Wien, Jürgen Cito TU Wien, Martina Lindorfer TU Wien
Pre-print
12:10
10m
Talk
NATE: A Network-Aware Testing Enhancer for Network-Related Fault Detection in Android Apps
Research Papers
Yuanhong Lan Nanjing University, Shaoheng Cao Nanjing University, Yifei Lu State Key Laboratory for Novel Software Technology, Nanjing University, China, Minxue Pan Nanjing University, Xuandong Li Nanjing University
12:20
10m
Talk
Automated Detection of Web Application Navigation Barriers for Screen Reader Users
Research Papers
Shubhi Jain University of California, Irvine, Syed Fatiul Huq University of California, Irvine, Ziyao He University of California, Irvine, Sam Malek University of California at Irvine
11:00 - 12:30
Maintenance & Evolution 3Research Papers / Journal-First at Grand Hall 3
Chair(s): Mali Izadi Delft University of Technology
11:00
10m
Talk
Automated Inline Comment Smell Detection and Repair with Large Language Models
Research Papers
Hatice Kübra Çağlar Bilkent University, Semih Çağlar Bilkent University, Eray Tüzün Bilkent University
Pre-print
11:10
10m
Talk
What’s DAT Smell? Untangling and Weaving the Disjoint Assertion Tangle Test Smell
Research Papers
Monil Narang University of California, Irvine, Hang Du University of California at Irvine, James Jones University of California at Irvine
Pre-print File Attached
11:20
10m
Talk
Your Build Scripts Stink: The State of Code Smells in Build Scripts
Research Papers
Mahzabin Tamanna North Carolina State University, Yash Chandrani North Carolina State University, Matthew Burrows North Carolina State University, Brandon Wroblewski North Carolina State University, Dominik Wermke North Carolina State University, Laurie Williams North Carolina State University
11:30
10m
Talk
Do Experts Agree About Smelly Infrastructure?
Journal-First
Sogol Masoumzadeh Mcgill University, Nuno Saavedra INESC-ID and IST, University of Lisbon, Rungroj Maipradit University of Waterloo, Lili Wei McGill University, João F. Ferreira Faculty of Engineering, University of Porto & INESC-ID, Daniel Varro Linköping University / McGill University, Shane McIntosh University of Waterloo
11:40
10m
Talk
Wired for Reuse: Automating Context-Aware Code Adaptation in IDEs via LLM-Based Agent
Research Papers
Taiming Wang Beijing Institute of Technology, Yanjie Jiang Peking University, Chunhao Dong Beijing Institute of Technology, Yuxia Zhang Beijing Institute of Technology, Hui Liu Beijing Institute of Technology
11:50
10m
Talk
BinStruct: Binary Structure Recovery Combining Static Analysis and Semantics
Research Papers
Yiran Zhang , Zhengzi Xu Imperial Global Singapore, Zhe Lang Institute of Information Engineering, CAS, CHENGYUE LIU , Yuqiang Sun Nanyang Technological University, Wenbo Guo Nanyang Technological University, Chengwei Liu Nanyang Technological University, Weisong Sun Nanyang Technological University, Yang Liu Nanyang Technological University
12:00
10m
Talk
SateLight: A Satellite Application Update Framework for Satellite Computing
Research Papers
Jinfeng Wen Beijing University of Posts and Telecommunications, Jianshu Zhao Beijing University of Posts and Telecommunications, Zixi Zhu Beijing University of Posts and Telecommunications, Xiaomin Zhang Beijing University of Posts and Telecommunications, Qi Liang Beijing University of Posts and Telecommunications, Ao Zhou Beijing University of Posts and Telecommunications, Shangguang Wang Beijing University of Posts and Telecommunications
12:10
10m
Talk
ComCat: Expertise-Guided Context Generation to Enhance Code Comprehension
Journal-First
Skyler Grandel Vanderbilt University, Scott Andersen National Autonomous University of Mexico, Yu Huang Vanderbilt University, Kevin Leach Vanderbilt University
12:20
10m
Talk
AdaptEval: A Benchmark for Evaluating Large Language Models on Code Snippet Adaptation
Research Papers
Tanghaoran Zhang National University of Defense Technology, Xinjun Mao National University of Defense Technology, Shangwen Wang National University of Defense Technology, Yuxin Zhao Key Laboratory of Software Engineering for Complex Systems, National University of Defense Technology, Yao Lu National University of Defense Technology, Jin Zhang Hunan Normal University, Zhang Zhang Key Laboratory of Software Engineering for Complex Systems, National University of Defense Technology, Kang Yang National University of Defense Technology, Yue Yu PengCheng Lab
11:00 - 12:30
Program Repair 3Research Papers at Grand Hall 4
Chair(s): Jooyong Yi UNIST
11:00
10m
Talk
Automated Repair of Ambiguous Problem Descriptions for LLM-Based Code Generation
Research Papers
Haoxiang Jia Peking University, Robbie Morris University College London, He Ye University College London (UCL), Federica Sarro University College London, Sergey Mechtaev Peking University
11:10
10m
Talk
Fixing Broken Graphs: LLM-Powered Automatic Code Optimization for DNN Programs
Research Papers
Haotian Wang Nankai University, Yicheng Sui Nankai University, Yudong Xie Nankai University, Yicong Liu Nankai University, Yufei Sun Nankai University, Changqing Shi Nankai University, Yuzhi Zhang Nankai University
11:20
10m
Talk
SemGuard: Real-Time Semantic Evaluator for Correcting LLM-Generated Code
Research Papers
Qinglin Wang Shandong Normal University, Zhihong Sun Shandong Normal University, Ruyun Wang Institute of Information Engineering, Chinese Academy of Sciences, Tao Huang Shandong Normal University, Zhi Jin Peking University, Ge Li Peking University, Chen Lyu Shandong Normal University
11:30
10m
Talk
Amur: Fixing Multi-Resource Leaks Guided by Resource Flow Analysis
Research Papers
Jinyoung Kim Sungkyunkwan University, Eunseok Lee Sungkyunkwan University
11:40
10m
Talk
Automated Repair of OpenID Connect Programs
Research Papers
Tamjid Al Rahat UCLA, Yanju Chen University of California, San Diego, Yu Feng University of California at Santa Barbara, Yuan Tian
11:50
10m
Talk
FlakyGuard: Automatically Fixing Flaky Tests at Industry ScaleACM SIGSOFT Distinguished Paper Award
Research Papers
Chengpeng Li University of Texas at Austin, Farnaz Behrang Uber Technologies, August Shi The University of Texas at Austin, Peng Liu Uber Technologies
12:00
10m
Talk
LLMPort: Cross-file Patch Porting via Task Decomposition and Self-correction
Research Papers
Bofei Chen Fudan University, Lei Zhang Fudan University, Peng Deng Fudan University, Nan Wang Fudan University, Haoyu Xu Fudan University, Mingda Guo Fudan Universityv, Yuan Zhang Fudan University, Min Yang Fudan University
12:10
10m
Talk
Repairing Leaks in Resource Wrappers
Research Papers
Sanjay Malakar University of California, Riverside, Martin Kellogg New Jersey Institute of Technology, Michael D. Ernst University of Washington, Manu Sridharan University of California at Riverside
Pre-print
12:20
10m
Talk
Automatic Fixing of Missing Dependency Errors
Research Papers
Jun Lyu Nanjing University, He Zhang Nanjing University, Lanxin Yang Nanjing University, Yue Li Nanjing University, Chenxing Zhong Nanjing University, Manuel Rigger National University of Singapore
11:00 - 12:30
Security 4Research Papers / Journal-First at Grand Hall 5
Chair(s): Saeid Tizpaz-Niari University of Illinois Chicago
11:00
10m
Talk
When Does Wasm Malware Detection Fail? A Systematic Analysis of Their Robustness to Evasion
Research Papers
Taeyoung Kim Sungkyunkwan University, Sanghak Oh Sungkyunkwan University, Kiho Lee ETRI (Electronics and Telecommunications Research Institute), South Korea, Weihang Wang University of Southern California, Yonghwi Kwon University of Maryland, Sanghyun Hong Oregon State University, Hyoungshick Kim Sungkyunkwan University
11:10
10m
Talk
RFCAudit: AI Agent for Auditing Protocol Implementations Against RFC Specifications
Research Papers
Mingwei Zheng Purdue University, Chengpeng Wang Purdue University, Xuwei Liu Purdue University, USA, Jinyao Guo Purdue University, Shiwei Feng Purdue University, Xiangyu Zhang Purdue University
11:20
10m
Talk
Time to separate from StackOverflow and match with ChatGPT for encryption
Journal-First
Ehsan Firouzi TU Clausthal, Mohammad Ghafari TU Clausthal
11:30
10m
Talk
Demystifying Cross-Language C/C++ Binaries: A Robust Software Component Analysis Approach
Research Papers
Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, Wei Tang HUA WEI, Xian Zhan HUA WEI, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China
11:40
10m
Talk
Detecting Various DeFi Price Manipulations with LLM Reasoning
Research Papers
Juantao Zhong Lingnan University, Daoyuan Wu Lingnan University, Ye Liu Singapore Management University, Maoyi Xie Nanyang Technological University, Yang Liu Nanyang Technological University, Yi Li Nanyang Technological University, Ning Liu City University of Hong Kong
11:50
10m
Talk
Uncovering Prompt Elements: Cloning System Prompts from Behavioral Traces
Research Papers
Yi Qian State Key Laboratory for Novel Software Technology, Nanjing University, Pengfei State Key Laboratory for Novel Software Technology, Nanjing University, Hao Wu , Ligeng Chen Honor Device Co., Ltd, Bing Mao Nanjing University
12:00
10m
Talk
CRYPTBARA: Dependency-Guided Detection of Python Cryptographic API Misuses
Research Papers
seogyeong cho Korea University, Seungeun Yu Korea University, Seunghoon Woo Korea University
12:10
10m
Talk
A Large Scale Study of AI-based Binary Function Similarity Detection Techniques for Security Researchers and Practitioners
Research Papers
Jingyi Shi Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Yufeng Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Xiao Chinese Academy of Sciences, Yuekang Li UNSW, Zhengzi Xu Imperial Global Singapore, Sihao Qiu Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Chi Zhang Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Keyu Qi Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xingchu Chen Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yanyan Zou Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences
12:20
10m
Talk
FirmProj: Detecting Firmware Leakage in IoT Update Processes via Companion App Analysis
Research Papers
Wenzhi Li Shandong University, Jialong Guo Shandong University, Jiongyi Chen National University of Defense Technology, Fan Li Shandong University, Yujie Xing Shandong University, Yanbo Xu Shanghai Jiao Tong University, Shishuai Yang Shandong University, Wenrui Diao Shandong University
11:00 - 12:30
Test Generation, Selection & Prioritization 1Research Papers / Journal-First at Vista
Chair(s): Owolabi Legunsen Cornell University
11:00
10m
Talk
PALM: Synergizing Program Analysis and LLMs to Enhance Rust Unit Test Coverage
Research Papers
Bei Chu Nanjing University, Yang Feng Nanjing University, Kui Liu Huawei, Hange Shi Nanjing University, Zifan Nan Huawei, Zhaoqiang Guo Software Engineering Application Technology Lab, Huawei, China, Baowen Xu Nanjing University
11:10
10m
Talk
ROR-DSE: ROR adequate test case generation using dynamic symbolic execution
Journal-First
11:20
10m
Talk
Reflective Unit Test Generation for Precise Type Error Detection with Large Language Models
Research Papers
Chen Yang Tianjin University, Ziqi Wang Tianjin University, Yanjie Jiang Peking University, Lin Yang Tianjin University, Yuteng Zheng Tianjin University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Junjie Chen Tianjin University
11:30
10m
Talk
FailMapper: Automated Generation of Unit Tests Guided by Failure Scenarios
Research Papers
ruiqi dong Swinburne University of Technology, Zehang Deng Swinburne University of Technology, Xiaogang Zhu Adelaide University, Xiaoning Du Monash University, Huai Liu Swinburne University of Technology, Shaohua Wang Central University of Finance and Economics, Sheng Wen Swinburne University of Technology, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology
11:40
10m
Talk
Advancing Code Coverage: Incorporating Program Analysis with Large Language Models
Journal-First
Chen Yang Tianjin University, Junjie Chen Tianjin University, Bin Lin Hangzhou Dianzi University, Ziqi Wang Tianjin University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd.
11:50
10m
Talk
Navigating the Labyrinth: Path-Sensitive Unit Test Generation with Large Language Models
Research Papers
Dianshu Liao the Australian National University, Xin Yin Zhejiang University, Shidong Pan Columbia University & New York University, Chao Ni Zhejiang University, Zhenchang Xing CSIRO's Data61, Xiaoyu Sun Australian National University, Australia
Pre-print
12:00
10m
Talk
Enhancing LLM’s Ability to Generate More Repository-Aware Unit Tests Through Precise Context Injection
Research Papers
Xin Yin Zhejiang University, Chao Ni Zhejiang University, Xinrui Li Zhejiang University, Liushan Chen Douyin Co., Ltd., Guojun Ma Douyin Co., Ltd., Xiaohu Yang Zhejiang University
Pre-print
12:10
10m
Talk
Toward Cost-Effective Adaptive Random Testing: An Approximate Nearest Neighbor Approach
Journal-First
Rubing Huang Macau University of Science and Technology (MUST), Chenhui Cui Macau University of Science and Technology, Junlong Lian Jiangsu University, Haibo Chen Jiangsu University, Dave Towey University of Nottingham Ningbo China, Weifeng Sun
12:20
10m
Talk
Automated Combinatorial Test Generation for Alloy
Research Papers
Agustín Borda University of Rio Cuarto, CONICET and Guangdong Technion-Israel Institute of Technology, Germán Regis University of Rio Cuarto and CONICET, Nazareno Aguirre University of Rio Cuarto/CONICET, Argentina, and Guangdong Technion-Israel Institute of Technology, China, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto
12:30 - 14:00
12:30
90m
Lunch
Lunch
Catering

14:00 - 15:30
Fuzzing 2Research Papers / Journal-First at Grand Hall 2
Chair(s): Kevin Borgolte Ruhr University Bochum
14:00
10m
Talk
Terminator: enabling efficient fuzzing of closed-source GUI programs by automatic coverage-guided termination
Research Papers
Jonas Zabel Fraunhofer SIT | ATHENE, Philip Kolvenbach , Steven Arzt Fraunhofer SIT; ATHENE
14:10
10m
Talk
Function Clustering-Based Fuzzing Termination: Toward Smarter Early Stopping
Research Papers
Liang Ding University of Science and Technology of China, Wenzhang Yang Institute of AI for industries, Yinxing Xue Institute of AI for Industries, Chinese Academy of Sciences
14:20
10m
Talk
Risk Estimation in Differential Fuzzing via Extreme Value Theory
Research Papers
Rafael Baez University of Texas at El Paso, Alejandro Olivas University of Texas at El Paso, Nathan K Diamond University of Texas at El Paso, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Yannic Noller Ruhr University Bochum, Saeid Tizpaz-Niari University of Illinois Chicago
14:30
10m
Talk
BCFuzz: Bytecode-Driven Fuzzing for JavaScript Engines
Research Papers
Jiming Wang SKLP, Institute of Computing Technology, CAS & University of Chinese Academy of Sciences, Chenggang Wu Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Zhongguancun Laboratory, Jikai Ren SKLP, Institute of Computing Technology, CAS & University of Chinese Academy of Sciences, Yuhao Hu SKLP, Institute of Computing Technology, CAS & University of Chinese Academy of Sciences, Yan Kang Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiaojie Wei SKLP, Institute of Computing Technology, CAS, Yuanming Lai Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mengyao Xie SKLP, Institute of Computing Technology, CAS, Zhe Wang Institute of Computing Technology at Chinese Academy of Sciences; Zhongguancun Laboratory
14:40
10m
Talk
LSPFuzz: Hunting Bugs in Language Servers
Research Papers
Hengcheng Zhu The Hong Kong University of Science and Technology, Songqiang Chen The Hong Kong University of Science and Technology, Valerio Terragni University of Auckland, Lili Wei McGill University, Yepang Liu Southern University of Science and Technology, Jiarong Wu , Shing-Chi Cheung Hong Kong University of Science and Technology
DOI Pre-print
14:50
10m
Talk
TEPHRA: Principled Discovery of Fuzzer LimitationsACM SIGSOFT Distinguished Paper Award
Research Papers
Vasil Sarafov μCSRL, CODE Research Institute, University of the Bundeswehr Munich, David Markvica μCSRL, CODE Research Institute, University of the Bundeswehr Munich, Stefan Brunthaler Munich Computer Systems Research Laboratory (uCSRL), CODE Research Institute, University of the Bundeswehr Munich
15:00
10m
Talk
Learning-Guided Fuzzing for Testing Stateful SDN Controllers
Journal-First
Raphaël Ollando University of Luxembourg, Seung Yeob Shin University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
15:10
10m
Talk
Learning from the Past: Real-World Exploit Migration for Smart Contract PoC Generation
Research Papers
Kairan Sun Nanyang Technological University, Zhengzi Xu Imperial Global Singapore, Kaixuan Li Nanyang Technological University, Lyuye Zhang Nanyang Technological University, Yebo Feng Nanyang Technological University, Daoyuan Wu Lingnan University, Yang Liu Nanyang Technological University
15:20
10m
Talk
RCFuzzer: Recommendation-based Collaborative Fuzzer
Journal-First
Hyeonmin Mo Hanyang University, Jongmun Yang Hanyang University, Yunho Kim Hanyang University
Link to publication
14:00 - 15:30
Web & Mobile Systems 2Research Papers / Journal-First at Grand Hall 3
Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security
14:00
10m
Talk
Adaptive and accessible user interfaces for seniors through model-driven engineering
Journal-First
Shavindra Wickramathilaka Monash University, John Grundy Monash University, Kashumi Madampe Monash University, Australia, Omar Haggag Monash University, Australia
Link to publication DOI
14:10
10m
Talk
AppBDS: LLM-Powered Description Synthesis for Sensitive Behaviors in Mobile Apps
Research Papers
Zichen Liu Arizona State University, Xusheng Xiao Arizona State University
14:20
10m
Talk
Large Language Models for Automated Web-Form-Test Generation: An Empirical Study
Journal-First
Tao Li Macau University of Science and Technology, Chenhui Cui Macau University of Science and Technology, Rubing Huang Macau University of Science and Technology (MUST), Dave Towey University of Nottingham Ningbo China, Lei Ma The University of Tokyo & University of Alberta
14:30
10m
Talk
Beyond Static GUI Agent: Evolving LLM-based GUI Testing via Dynamic Memory
Research Papers
Mengzhuo Chen Institute of Software, Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen TU Munich, Junjie Wang Institute of Software at Chinese Academy of Sciences, Yangguang Xue University of Chinese Academy of Sciences, Boyu Wu Institute of Software at Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Libin Wu Institute of Software Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences
14:40
10m
Talk
Who's to Blame? Rethinking the Brittleness of Automated Web GUI Testing from a Pragmatic Perspective
Research Papers
Haonan Zhang University of Waterloo, Kundi Yao University of Waterloo, Zishuo Ding The Hong Kong University of Science and Technology (Guangzhou), Lizhi Liao Memorial University of Newfoundland, Weiyi Shang University of Waterloo
14:50
10m
Talk
LLM-Cure: LLM-based Competitor User Review Analysis for Feature Enhancement
Journal-First
Maram Assi Université du Québec à Montréal, Safwat Hassan University of Toronto, Ying Zou Queen's University, Kingston, Ontario
15:00
10m
Talk
MIMIC: Integrating Diverse Personality Traits for Better Game Testing Using Large Language Model
Research Papers
Yifei Chen McGill University, Sarra Habchi Cohere, Canada, Lili Wei McGill University
Link to publication Pre-print
15:10
10m
Talk
Debun: Detecting Bundled JavaScript Libraries on Web using Property-Order Graphs
Research Papers
Seojin Kim North Carolina State University, Sungmin Park Korea University, Jihyeok Park Korea University
15:20
10m
Talk
GUIFuzz++: Unleashing Grey-box Fuzzing on Desktop Graphical User Interfacing Applications
Research Papers
Dillon Otto University of Utah, Tanner Rowlett University of Utah, Stefan Nagy University of Utah
Pre-print
14:00 - 15:30
Program Analysis 2Research Papers at Grand Hall 4
Chair(s): Raffi Khatchadourian CUNY Hunter College
14:00
10m
Talk
Incremental Program Analysis in the Wild: An Empirical Study on Real-World Program Changes
Research Papers
Xizao Wang Nanjing University, Xiangrong Bin Nanjing University, Lanxin Huang Nanjing University, Shangqing Liu Nanjing University, Jianhua Zhao Nanjing University, China, Lei Bu Nanjing University
14:10
10m
Talk
Spinner: Detecting Locking Violations in the eBPF Runtime
Research Papers
Priya Govindasamy University of California, Irvine, Joseph Bursey University of California, Irvine, Hsin-Wei Hung Meta, Ardalan Amiri Sani University of California, Irvine
14:20
10m
Talk
Towards More Accurate Static Analysis for Taint-style Bug Detection in Linux Kernel
Research Papers
Haonan Li University of California at Riverside, USA, Hang Zhang Indiana University, Kexin Pei The University of Chicago, Zhiyun Qian University of California at Riverside, USA
Pre-print
14:30
10m
Talk
Automated Insertion of Flushes and Fences for Persistency
Research Papers
Yutong Guo University of California, Irvine, Weiyu Luo University of California, Irvine, Brian Demsky University of California at Irvine
14:40
10m
Talk
DIFFFIX: Incrementally Fixing AST Diffs via Context and Type Information
Research Papers
Guofeng Zeng University of Science and Technology Beijing, Chang-ai Sun University of Science and Technology Beijing, Kai Gao University of Science and Technology Beijing, Huai Liu Swinburne University of Technology
14:50
10m
Talk
Breaking the Traffic Barrier: Unveiling Multi-Format of Protocols via Autonomous Program Exploration
Research Papers
Dingzhao Xue Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Yibo Qu Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Bowen Jiang Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Xin Chen , Shuaizong Si Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
15:00
10m
Talk
Loupe: End-to-End Learning of Loop Unrolling Heuristics for Abstract Interpretation
Research Papers
Maykel Mattar Université Paris-Saclay, CEA, List / Université Bretagne Sud, IRISA, Michele Alberti CEA, LIST, France, Valentin Perrelle CEA, LIST, France, Salah Sadou IRISA & CNRS, Universite Bretagne Sud,France
15:10
10m
Talk
Belief Propagation with Local Structure and Its Applications in Program Analysis
Research Papers
Yiqian Wu Peking University, China, Yifan Chen Peking University, Yingfei Xiong Peking University, Xin Zhang Peking University
Pre-print
15:20
10m
Talk
On the Correctness of Software Merge
Research Papers
Akira Mori National Institute of Advanced Industrial Science and Technology (AIST), Masatomo Hashimoto Chiba Institute of Technology
Media Attached
14:00 - 15:30
Security 5Research Papers at Grand Hall 5
Chair(s): Yanjie Jiang Peking University
14:00
10m
Talk
Advancing Binary Code Similarity Detection via Context-Content Fusion and LLM Verification
Research Papers
Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Jingdong Guo Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Shouguo Yang Zhongguancun Laboratory, Beijing, China, Yi Li Nanyang Technological University, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Xiao Chinese Academy of Sciences, Yongle Chen Taiyuan University of Technology, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:10
10m
Talk
ACTaint: Agent-Based Taint Analysis for Access Control Vulnerabilities in Smart Contracts
Research Papers
Huarui Lin Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Jiachi Chen Sun Yat-sen University, Xiang Chen Nantong University, Xiaohu Yang Zhejiang University, Lingfeng Bao Zhejiang University
14:20
10m
Talk
AMPLE: Fine-grained File Access Policies for Server Applications
Research Papers
Seyedhamed Ghavamnia Bloomberg, Julien Vanegue Imperial College London; Bloomberg
14:30
10m
Talk
Mockingbird: Efficient Excessive Data Exposures Detection via Dynamic Code Instrumentation
Research Papers
Chenxiao Xia Beijing Institute of Technology, Jiazheng Sun Fudan University, Jun Zheng Beijing Institute of Technology, Yu-an Tan Beijing Institute of Technology, Hongyi Su Beijing Institute of Technology
14:40
10m
Talk
DrainCode: Stealthy Energy Consumption Attacks on Retrieval-Augmented Code Generation via Context Poisoning
Research Papers
Yanlin Wang Sun Yat-sen University, Jiadong Wu School of Software Engineering, Sun Yat-sen University, Tianyue Jiang Sun Yat-sen University, Mingwei Liu Sun Yat-Sen University, Jiachi Chen Sun Yat-sen University, Chong Wang Nanyang Technological University, Ensheng Shi Huawei, Xilin Liu Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies, Hongyu Zhang Chongqing University, Zibin Zheng Sun Yat-sen University
14:50
10m
Talk
Finding Insecure State Dependency in DApps via Multi-Source Tracing and Semantic Enrichment
Research Papers
Jingwen Zhang School of Software Engineering, Sun Yat sen University, Yuhong Nan Sun Yat-sen University, Wei Li School of Software Engineering, Sun Yat sen University, Kaiwen Ning Sun Yat-sen University, Zewei Lin Sun Yat-sen University, Zitong Yao School of Software Engineering, Sun Yat sen University, Yuming Feng Peng Cheng Laboratory, Weizhe Zhang Harbin Institute of Technology, Zibin Zheng Sun Yat-sen University
15:00
10m
Talk
Better Safe than Sorry: Preventing Policy Violations through Predictive Root-Cause-Analysis for IoT Systems
Research Papers
Michael Norris Penn State University, Syed Rafiul Hussain Pennsylvania State University, Gang (Gary) Tan Pennsylvania State University
15:10
10m
Talk
Backdoors in Code Summarizers: How Bad Is It?
Research Papers
Chenyu Wang Singapore Management University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Yaniv Harel Tel Aviv University, David Lo Singapore Management University
Pre-print
15:20
10m
Talk
ProfMal: Detecting Malicious NPM Packages by the Synergy between Static and Dynamic Analysis
Research Papers
Yiheng Huang Fudan University, Wen Zheng Fudan University, Susheng Wu Fudan University, Bihuan Chen Fudan University, You Lu Fudan University, Zhuotong Zhou Fudan University, Yiheng Cao Fudan University, Xiaoyu Li Fudan University, Xin Peng Fudan University
14:00 - 15:30
Test Generation, Selection & Prioritization 2Research Papers / Journal-First at Vista
Chair(s): Darko Marinov University of Illinois at Urbana-Champaign
14:00
10m
Talk
LLMs for Automated Unit Test Generation and Assessment in Java: The AgoneTest Framework
Research Papers
Andrea Lops Polytechnic University of Bari, Italy, Fedelucio Narducci Polytechnic University of Bari, Azzurra Ragone University of Bari, Michelantonio Trizio Wideverse, Claudio Bartolini Wideverse s.r.l.
Pre-print
14:10
10m
Talk
µOpTime: Statically Reducing the Execution Time of Microbenchmark Suites Using Stability Metrics
Journal-First
Nils Japke TU Berlin & ECDF, Martin Grambow TU Berlin & ECDF, Christoph Laaber Simula Research Laboratory, David Bermbach TU Berlin
14:20
10m
Talk
Reference-Based Retrieval-Augmented Unit Test Generation
Journal-First
Zhe Zhang Beihang University, Liu Xingyu Beihang University, Yuanzhang Lin Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University, Yuan Yuan Beihang University
14:30
10m
Talk
Using Active Learning to Train Predictive Mutation Testing with Minimal Data
Research Papers
Miklos Borsi Karlsruhe Institute of Technology
14:40
10m
Talk
Clarifying Semantics of In-Context Examples for Unit Test GenerationACM SIGSOFT Distinguished Paper Award
Research Papers
Chen Yang Tianjin University, Lin Yang Tianjin University, Ziqi Wang Tianjin University, Dong Wang Tianjin University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Junjie Chen Tianjin University
14:50
10m
Talk
An empirical study of test case prioritization on the Linux Kernel
Journal-First
Haichi Wang College of Intelligence and Computing, Tianjin University, Ruiguo Yu College of Intelligence and Computing, Tianjin University, Dong Wang Tianjin University, Yiheng Du College of Intelligence and Computing, Tianjin University, Yingquan Zhao Tianjin University, Junjie Chen Tianjin University, Zan Wang Tianjin University
15:00
10m
Talk
Automated Generation of Issue-Reproducing Tests by Combining LLMs and Search-Based Testing
Research Papers
Konstantinos Kitsios University of Zurich, Marco Castelluccio Mozilla, Alberto Bacchelli University of Zurich
Pre-print
15:10
10m
Talk
Using Fourier Analysis and Mutant Clustering to Accelerate DNN Mutation Testing
Research Papers
Ali Ghanbari Auburn University, Sasan Tavakkol Google Research
15:20
10m
Talk
WEST: Specification-Based Test Generation for WebAssemblyACM SIGSOFT Distinguished Paper Award
Research Papers
15:30 - 16:00
15:30
30m
Coffee break
Break
Catering

Accepted Papers

Title
Adaptive and accessible user interfaces for seniors through model-driven engineering
Journal-First
Link to publication DOI
Advanced White-Box Heuristics for Search-Based Fuzzing of REST APIs
Journal-First
Advancing Code Coverage: Incorporating Program Analysis with Large Language Models
Journal-First
An empirical study of test case prioritization on the Linux Kernel
Journal-First
AutoAdapt: On the Application of AutoML for Parameter-Efficient Fine-Tuning of Pre-Trained Code Models
Journal-First
Bias Testing and Mitigation in LLM-based Code Generation
Journal-First
ComCat: Expertise-Guided Context Generation to Enhance Code Comprehension
Journal-First
Do Experts Agree About Smelly Infrastructure?
Journal-First
Effectiveness of symmetric metamorphic relations on validating the stability of code generation LLM
Journal-First
Engineering Digital Systems for Humanity: a Research Roadmap
Journal-First
Enhancing Differential Testing With LLMs For Testing Deep Learning Libraries
Journal-First
Finding Safety Violations of AI-Enabled Control Systems through the Lens of Synthesized Proxy Programs
Journal-First
Link to publication DOI Pre-print
FlexFL: Flexible and Effective Fault Localization With Open-Source Large Language Models
Journal-First
GNNContext: GNN-based Code Context Prediction for Programming Tasks
Journal-First
Identifying inconsistent software defect predictions with symmetry metamorphic relation pattern
Journal-First
Large Language Models for Automated Web-Form-Test Generation: An Empirical Study
Journal-First
Learning-Guided Fuzzing for Testing Stateful SDN Controllers
Journal-First
LLM-Cure: LLM-based Competitor User Review Analysis for Feature Enhancement
Journal-First
LLM-Powered Static Binary Taint Analysis
Journal-First
LogUpdater: Automated Detection and Repair of Specific Defects in Logging Statements
Journal-First
Managing the variability of a logistics robotic system
Journal-First
MET-MAPF: A Metamorphic Testing Approach for Multi-Agent Path Finding Algorithms
Journal-First
Link to publication DOI
Mokav: Execution-driven Differential Testing with LLMs
Journal-First
MORepair: Teaching LLMs to Repair Code via Multi-Objective Fine-Tuning
Journal-First
Link to publication DOI Pre-print
µOpTime: Statically Reducing the Execution Time of Microbenchmark Suites Using Stability Metrics
Journal-First
Quantum Circuit Mutants: Empirical Analysis and Recommendations
Journal-First
Link to publication DOI
RCFuzzer: Recommendation-based Collaborative Fuzzer
Journal-First
Link to publication
Reference-Based Retrieval-Augmented Unit Test Generation
Journal-First
Reinforcement Learning for Mutation Operator Selection in Automated Program Repair
Journal-First
Resolving Conditional Implicit Calls to Improve Static and Dynamic Analysis in Android Apps
Journal-First
ROR-DSE: ROR adequate test case generation using dynamic symbolic execution
Journal-First
Software Reconfiguration in Robotics
Journal-First
SpectAcle: Fault Localisation of AI-Enabled CPS by Exploiting Sequences of DNN Controller Inferences
Journal-First
Link to publication DOI
Sprint2Vec: A Deep Characterization of Sprints in Iterative Software Development
Journal-First
Stealthy Backdoor Attack for Code Models
Journal-First
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes
Journal-First
TARGET: Traffic Rule-Based Test Generation for Autonomous Driving via Validated LLM-Guided Knowledge Extraction
Journal-First
Test-based Patch Clustering for Automatically-Generated Patches Assessment
Journal-First
The Impact of the COVID-19 Pandemic on Women’s Contribution to Public Code
Journal-First
Link to publication DOI Pre-print
Time to separate from StackOverflow and match with ChatGPT for encryption
Journal-First
Toward Cost-Effective Adaptive Random Testing: An Approximate Nearest Neighbor Approach
Journal-First
Validity-Preserving Delta Debugging via Generator Trace Reduction
Journal-First
Variational Prefix Tuning for diverse and accurate code summarization using pre-trained language models
Journal-First
VERCATION: Precise Vulnerable Open-source Software Version Identification based on Static Analysis and LLM
Journal-First
Vision to Specification: Automating the Transition from Conceptual Features to Functional Requirements
Journal-First
Why Do Machine Learning Notebooks Crash? An Empirical Study on Public Python Jupyter Notebooks
Journal-First

Call for Papers

ASE is inviting authors to present their journal-first papers published recently in prestigious software engineering journals. This will both enrich the ASE program and offer the authors an opportunity to speak to the community. The journal-first manuscripts are published through the journals and will not be part of the ASE proceedings. However, they will be listed in the conference program. At least one author of each presentation accepted for the journal-first program must register and attend the conference to present the paper.

Scope

We invite applications for journal papers published in:

  • Automated Software Engineering Journal (ASEJ, Springer)
  • IEEE Transaction of Software Engineering (IEEE TSE)
  • ACM Transactions on Software Engineering and Methodology (ACM TOSEM)
  • Empirical Software Engineering Journal (EMSE, Springer)
  • Journal of Systems and Software (JSS, Elsevier)

A journal-first presentation submitted to ASE 2025 must adhere to the following criteria:

  • The paper was accepted for publication after January 1st, 2024.
  • The paper is in the scope of the conference, as defined in the call for ASE 2025 research papers.
  • The paper does not exclusively report a secondary study, e.g., systematic reviews, mapping studies, or surveys.
  • The paper reports completely new research results and/or presents novel contributions that significantly extend and were not previously reported in prior work.
  • The paper does not extend prior work solely with additional proofs or algorithms (or other such details presented for completeness), additional empirical results, or minor enhancements or variants of the results presented in the prior work. As a rough guide, a journal-first paper should have at least 70% new content over and above the content of previous publications. As such, the expectation is that an extension of a full 8-10 page conference or workshop paper would not be deemed a journal-first paper.
  • The paper has not been presented at and is not under consideration for journal-first programs of other conferences.

How to Submit

Authors of manuscripts that respect the aforementioned criteria are invited to submit a one-page presentation proposal. Optionally, combining the original journal paper with the proposal would be appreciated. The proposal should include the paper’s title, authors, an extended abstract, the name of the presenter, and a link to the original journal paper on the journal’s website. Each journal-first paper should be presented by a different author, but there is no limitation on the number of papers accepted per author. If the paper is not yet available online, please specify that. The original paper should also be uploaded during submission. If the journal paper is related to or builds on a previously published work (such as a tool demo or a poster), then the proposal must clearly and explicitly justify why the paper should be considered a journal-first paper.

The submission link is: https://ase2025-jf.hotcrp.com

By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.

Evaluation and Selection

Authors will be invited to present their paper at ASE 2025 after a check that the paper is in scope for the conference, and it adheres to the criteria above. As the papers have already been reviewed and accepted by the journals, they will not be reviewed again for technical content. In the case that an exceptionally high number of submissions is received, not all papers will be selected. Priority will be given to the papers that:

  • Increase opportunities for authors to attend ASE, who might not otherwise attend. In particular, priority will be given to papers whose specified presenter is not presenting other journal-first papers.
  • Best fit the technical program, offering a balance across the conference topics.
  • Would be ineligible as a journal-first presentation at the next SE3 conference (ICSE/FSE/ASE) because its acceptance date precedes the next conference’s window of journal acceptance dates for journal-first presentations.