Technical PapersISSTA 2022
The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.
Wed 20 JulDisplayed time zone: Seoul change
01:20 - 02:40 | |||
01:20 20mTalk | Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper Technical Papers DOI | ||
01:40 20mTalk | Evolution-Aware Detection of Order-Dependent Flaky Tests Technical Papers DOI | ||
02:00 20mTalk | jTrans: Jump-Aware Transformer for Binary Code Similarity Detection Technical Papers Hao Wang Tsinghua University, Wenjie Qu Huazhong University of Science and Technology, Gilad Katz Ben-Gurion University of the Negev, Wenyu Zhu Tsinghua University, Zeyu Gao University of Science and Technology of China, Han Qiu Tsinghua University, Jianwei Zhuge Tsinghua University, Chao Zhang Tsinghua University DOI Pre-print | ||
02:20 20mTalk | On the Use of Evaluation Measures for Defect Prediction Studies Technical Papers DOI |
01:20 - 02:20 | Session 1-2: Test Generation and Mutation ATechnical Papers at ISSTA 2 Chair(s): Raghavan Komondoor IISc Bengaluru | ||
01:20 20mTalk | On the Use of Mutation Analysis For Evaluating Student Test Suite Quality Technical Papers James Perretta Northeastern University, Andrew DeOrio University of Michigan, Arjun Guha Northeastern University, Jonathan Bell Northeastern University DOI | ||
01:40 20mTalk | Automated Test Generation for REST APIs: No Time to Rest Yet Technical Papers DOI | ||
02:00 20mTalk | One Step Further: Evaluating Interpreters Using Metamorphic Testing Technical Papers Ming Fan Xi'an Jiaotong University, Jiali Wei Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhou Xu Wuhan University, Wenying Wei Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University DOI |
03:00 - 04:00 | |||
03:00 20mTalk | Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper) Technical Papers Jialu Zhang Yale University, Todd Mytkowicz Microsoft Research, Mike Kaufman Microsoft Corporation, Ruzica Piskac Yale University, Shuvendu K. Lahiri Microsoft Research DOI | ||
03:20 20mTalk | Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing Technical Papers Hasan Ferit Eniser MPI-SWS, Timo P. Gros Saarland University, Germany, Valentin Wüstholz ConsenSys, Jörg Hoffmann Saarland University and DFKI, Germany, Maria Christakis MPI-SWS DOI Pre-print | ||
03:40 20mTalk | An Extensive Study on Pre-trained Models for Program Understanding and Generation Technical Papers Zhengran Zeng Southern University of Science and Technology, Hanzhuo Tan Southern University of Science and Technology, The Hong Kong Polytechnic University, Haotian Zhang , Jing Li The Hong Kong Polytech University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign DOI |
03:00 - 04:00 | |||
03:00 20mTalk | eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts Technical Papers Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Karthik Pattabiraman University of British Columbia DOI | ||
03:20 20mTalk | Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution Technical Papers Peilin Zheng Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University DOI | ||
03:40 20mTalk | WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts Technical Papers Weimin Chen The Hong Kong Polytechnic University, Zihan Sun Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Haipeng Cai Washington State University, USA, Lei Wu Zhejiang University DOI |
07:00 - 08:20 | Session 2-1: Oracles, Models, and Measurement ETechnical Papers at ISSTA 1 Chair(s): Christoph Csallner University of Texas at Arlington | ||
07:00 20mTalk | On the Use of Evaluation Measures for Defect Prediction Studies Technical Papers DOI | ||
07:20 20mTalk | Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper Technical Papers DOI | ||
07:40 20mTalk | Evolution-Aware Detection of Order-Dependent Flaky Tests Technical Papers DOI | ||
08:00 20mTalk | FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases Technical Papers DOI Pre-print |
07:00 - 08:20 | |||
07:00 20mTalk | Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper Technical Papers Zhiming Li Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Singapore, Haoliang Li City University of Hong Kong, Zhengzi Xu Nanyang Technological University, Yi Li Nanyang Technological University, Yang Liu Nanyang Technological University DOI | ||
07:20 20mTalk | DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions Technical Papers Danning Xie Purdue University, Yitong Li University of Waterloo, Mijung Kim UNIST, Hung Viet Pham University of Waterloo, Lin Tan Purdue University, Xiangyu Zhang Purdue University, Michael W. Godfrey University of Waterloo, Canada DOI | ||
07:40 20mTalk | HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models Technical Papers DOI | ||
08:00 20mTalk | Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs Technical Papers Charaka Geethal Monash University, Thuan Pham The University of Melbourne, Aldeida Aleti Monash University, Marcel Böhme MPI-SP, Germany and Monash University, Australia DOI Pre-print |
08:40 - 09:40 | |||
08:40 20mTalk | TELL: Log Level Suggestions via Modeling Multi-level Code Block Information Technical Papers Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore DOI | ||
09:00 20mTalk | Hunting Bugs with Accelerated Optimal Graph Vertex Matching Technical Papers Xiaohui Zhang Renmin University of China, Yuanjun Gong Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wei You Renmin University of China, Wenchang Shi Renmin University of China, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI | ||
09:20 20mTalk | Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper) Technical Papers Jialu Zhang Yale University, Todd Mytkowicz Microsoft Research, Mike Kaufman Microsoft Corporation, Ruzica Piskac Yale University, Shuvendu K. Lahiri Microsoft Research DOI |
08:40 - 09:40 | |||
08:40 20mTalk | ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems Technical Papers Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Zhenyu Chen Nanjing University DOI | ||
09:00 20mTalk | BET: Black-box Efficient Testing for Convolutional Neural Networks Technical Papers Wang Jialai Tsinghua University, Han Qiu Tsinghua University, Yi Rong Tsinghua University, Hengkai Ye Purdue University, Qi Li Tsinghua University, Zongpeng Li Tsinghua University, Chao Zhang Tsinghua University DOI | ||
09:20 20mTalk | Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment Technical Papers Geunwoo Kim University of California, Irvine, USA, Sanghyun Hong Oregon State University, Michael Franz University of California, Irvine, Dokyung Song Yonsei University, South Korea DOI |
10:00 - 11:00 | Session 2-5: Android BTechnical Papers at ISSTA 1 Chair(s): Christoph Csallner University of Texas at Arlington | ||
10:00 20mTalk | Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study) Technical Papers Pei Liu Monash University, Yanjie Zhao Monash University, Haipeng Cai Washington State University, USA, Mattia Fazzini University of Minnesota, John Grundy Monash University, Li Li Monash University DOI | ||
10:20 20mTalk | PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications Technical Papers Shuaihao Yang Nanjing University of Science and Technology, Zigang Zeng Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI | ||
10:40 20mTalk | Detecting and Fixing Data Loss Issues in Android Apps Technical Papers Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University DOI |
10:00 - 10:40 | |||
10:00 20mTalk | Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems Technical Papers Ziyuan Zhong Columbia University, Zhisheng Hu Baidu Security, Shengjian Guo Baidu Security, Xinyang Zhang Baidu Security, Zhenyu Zhong Baidu USA, Baishakhi Ray Columbia University DOI | ||
10:20 20mTalk | Deadlock Prediction via Generalized Dependency Technical Papers Jinpeng Zhou University of Pittsburgh, Hanmei Yang University of Massachusetts Amherst, John Lange Oak Ridge National Lab/University of Pittsburgh, Tongping Liu University of Massachusetts at Amherst DOI |
16:20 - 17:40 | Session 3-1: Static Analysis and Specifications Testing CTechnical Papers at ISSTA 1 Chair(s): Ding Li Peking University | ||
16:20 20mTalk | A Large-scale Study of Usability Criteria addressed by Static Analysis Tools Technical Papers Marcus Nachtigall Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institute, Paderborn University, Eric Bodden University of Paderborn; Fraunhofer IEM DOI | ||
16:40 20mTalk | An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection Technical Papers Stephan Lipp Technical University of Munich, Sebastian Banescu Technical University of Munich, Alexander Pretschner TU Munich DOI Pre-print | ||
17:00 20mTalk | Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper) Technical Papers Frank Busse Imperial College London, Pritam Gharat Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London DOI Pre-print | ||
17:20 20mTalk | Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection Technical Papers Xiao Cheng University of Technology Sydney, Guanqin Zhang University of Technology Sydney, Haoyu Wang Huazhong University of Science and Technology, China, Yulei Sui University of New South Wales DOI |
16:20 - 17:20 | Session 3-2: Fuzzing and Friends CTechnical Papers at ISSTA 2 Chair(s): Behnaz Hassanshahi Oracle Labs, Australia | ||
16:20 20mTalk | SnapFuzz: High-Throughput Fuzzing of Network Applications Technical Papers DOI | ||
16:40 20mTalk | SLIME: Program-sensitive Energy Allocation for Fuzzing Technical Papers Chenyang Lyu Zhejiang University, Hong Liang Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Binbin Zhao Georgia Institute of Technology, Meng Han Binjiang Institute of Zhejiang University & Zhejiang University, Yun Li Huawei Technologies Co., Ltd., Zhe Wang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology DOI | ||
17:00 20mTalk | Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs Technical Papers DOI |
18:00 - 19:00 | Session 3-3: Test Generation and Mutation CTechnical Papers at ISSTA 1 Chair(s): Stefan Winter LMU Munich | ||
18:00 20mTalk | One Step Further: Evaluating Interpreters Using Metamorphic Testing Technical Papers Ming Fan Xi'an Jiaotong University, Jiali Wei Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhou Xu Wuhan University, Wenying Wei Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University DOI | ||
18:20 20mTalk | Test Mimicry to Assess the Exploitability of Library Vulnerabilities Technical Papers Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Xuan Bach D. Le The University of Melbourne, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, David Lo Singapore Management University DOI | ||
18:40 20mTalk | RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History Technical Papers Xuezhi Song Fudan University, Yun Lin National University of Singapore, Siang Hwee Ng National University of Singapore, Yijian Wu Fudan University, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University DOI Pre-print |
18:00 - 19:00 | |||
18:00 20mTalk | Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation Technical Papers Yaowen Zheng Nanyang Technological University; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China;, Yuekang Li Nanyang Technological University, Cen Zhang Nanyang Technological University, Hongsong Zhu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University, Limin Sun Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China DOI | ||
18:20 20mTalk | MDPFuzz: Testing Models Solving Markov Decision Processes Technical Papers Qi Pang HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology DOI | ||
18:40 20mTalk | PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation Technical Papers Zheyu Ma , Bodong Zhao Tsinghua University, Letu Ren Department of Computer Science and Technology, Tsinghua University, Zheming Li Tsinghua University, Siqi Ma the University of Queensland, Xiapu Luo Hong Kong Polytechnic University, Chao Zhang Tsinghua University DOI |
Thu 21 JulDisplayed time zone: Seoul change
01:20 - 02:00 | |||
01:20 20mTalk | Testing Dafny (Experience Paper) Technical Papers Ahmed Irfan Amazon Web Services, Sorawee Porncharoenwase University of Washington, Zvonimir Rakamaric Amazon Web Services, Neha Rungta Amazon Web Services, Emina Torlak Amazon Web Services DOI | ||
01:40 20mTalk | The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper Technical Papers Ingkarat Rak-amnouykit Rensselaer Polytechnic Institute, Ana Milanova Rensselaer Polytechnic Institute, Guillaume Baudart Inria; ENS; PSL University, Martin Hirzel IBM Research, Julian Dolby IBM Research, USA DOI |
01:20 - 02:20 | |||
01:20 20mTalk | A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware Technical Papers Binbin Zhao Georgia Institute of Technology, Shouling Ji Zhejiang University, Jiacheng Xu Zhejiang University, Yuan Tian University of Virginia, Qiuyang Wei Zhejiang University, Qinying Wang Zhejiang University, Chenyang Lyu Zhejiang University, Xuhong Zhang Zhejiang University, Changting Lin Binjiang Institute of Zhejiang University, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Raheem Beyah Georgia Institute of Technology DOI | ||
01:40 20mTalk | Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems Technical Papers Ziyuan Zhong Columbia University, Zhisheng Hu Baidu Security, Shengjian Guo Baidu Security, Xinyang Zhang Baidu Security, Zhenyu Zhong Baidu USA, Baishakhi Ray Columbia University DOI | ||
02:00 20mTalk | Understanding Device Integration Bugs in Smart Home System Technical Papers Tao Wang , Kangkang Zhang Institute of Software Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences DOI |
03:00 - 04:00 | Session 1-7: Static Analysis and Specifications Testing ATechnical Papers at ISSTA 1 Chair(s): Raghavan Komondoor IISc Bengaluru | ||
03:00 20mTalk | A Large-scale Study of Usability Criteria addressed by Static Analysis Tools Technical Papers Marcus Nachtigall Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institute, Paderborn University, Eric Bodden University of Paderborn; Fraunhofer IEM DOI | ||
03:20 20mTalk | An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection Technical Papers Stephan Lipp Technical University of Munich, Sebastian Banescu Technical University of Munich, Alexander Pretschner TU Munich DOI Pre-print | ||
03:40 20mTalk | Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper) Technical Papers Frank Busse Imperial College London, Pritam Gharat Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London DOI Pre-print |
03:00 - 03:40 | |||
03:00 20mTalk | Deadlock Prediction via Generalized Dependency Technical Papers Jinpeng Zhou University of Pittsburgh, Hanmei Yang University of Massachusetts Amherst, John Lange Oak Ridge National Lab/University of Pittsburgh, Tongping Liu University of Massachusetts at Amherst DOI | ||
03:20 20mTalk | Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning Technical Papers Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China DOI |
07:00 - 08:00 | Session 2-7: Test Generation and Mutation BTechnical Papers at ISSTA 1 Chair(s): Christoph Csallner University of Texas at Arlington | ||
07:00 20mTalk | Automated Test Generation for REST APIs: No Time to Rest Yet Technical Papers DOI | ||
07:20 20mTalk | On the Use of Mutation Analysis For Evaluating Student Test Suite Quality Technical Papers James Perretta Northeastern University, Andrew DeOrio University of Michigan, Arjun Guha Northeastern University, Jonathan Bell Northeastern University DOI | ||
07:40 20mTalk | Test Mimicry to Assess the Exploitability of Library Vulnerabilities Technical Papers Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Xuan Bach D. Le The University of Melbourne, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, David Lo Singapore Management University DOI |
07:00 - 08:00 | |||
07:00 20mTalk | A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware Technical Papers Binbin Zhao Georgia Institute of Technology, Shouling Ji Zhejiang University, Jiacheng Xu Zhejiang University, Yuan Tian University of Virginia, Qiuyang Wei Zhejiang University, Qinying Wang Zhejiang University, Chenyang Lyu Zhejiang University, Xuhong Zhang Zhejiang University, Changting Lin Binjiang Institute of Zhejiang University, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Raheem Beyah Georgia Institute of Technology DOI | ||
07:20 20mTalk | Automated Testing of Image Captioning Systems Technical Papers BoXi Yu The Chinese University of Hong Kong, Shenzhen, Zhiqing Zhong South China University of Technology, Xinran Qin South China University of Technology, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuancheng Wang The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen DOI | ||
07:40 20mTalk | LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems Technical Papers DOI |
08:40 - 09:40 | |||
08:40 20mTalk | Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing Technical Papers Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yicheng Wang Institute of Software Chinese Academy of Sciences, Zheng Qin Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
09:00 20mTalk | RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History Technical Papers Xuezhi Song Fudan University, Yun Lin National University of Singapore, Siang Hwee Ng National University of Singapore, Yijian Wu Fudan University, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University DOI Pre-print | ||
09:20 20mTalk | Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis Technical Papers Zhiyong Wu Tsinghua University, China, Jie Liang School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University DOI |
08:40 - 09:40 | Session 2-10: Static Analysis and Specifications Testing BTechnical Papers at ISSTA 2 Chair(s): Behnaz Hassanshahi Oracle Labs, Australia | ||
08:40 20mTalk | Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection Technical Papers Xiao Cheng University of Technology Sydney, Guanqin Zhang University of Technology Sydney, Haoyu Wang Huazhong University of Science and Technology, China, Yulei Sui University of New South Wales DOI | ||
09:00 20mTalk | Testing Dafny (Experience Paper) Technical Papers Ahmed Irfan Amazon Web Services, Sorawee Porncharoenwase University of Washington, Zvonimir Rakamaric Amazon Web Services, Neha Rungta Amazon Web Services, Emina Torlak Amazon Web Services DOI | ||
09:20 20mTalk | The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper Technical Papers Ingkarat Rak-amnouykit Rensselaer Polytechnic Institute, Ana Milanova Rensselaer Polytechnic Institute, Guillaume Baudart Inria; ENS; PSL University, Martin Hirzel IBM Research, Julian Dolby IBM Research, USA DOI |
16:20 - 17:40 | Session 3-5: Concurrency, IoT, Embedded CTechnical Papers at ISSTA 1 Chair(s): Stefan Winter LMU Munich | ||
16:20 20mTalk | Understanding Device Integration Bugs in Smart Home System Technical Papers Tao Wang , Kangkang Zhang Institute of Software Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences DOI | ||
16:40 20mTalk | Automated Testing of Image Captioning Systems Technical Papers BoXi Yu The Chinese University of Hong Kong, Shenzhen, Zhiqing Zhong South China University of Technology, Xinran Qin South China University of Technology, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuancheng Wang The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen DOI | ||
17:00 20mTalk | LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems Technical Papers DOI | ||
17:20 20mTalk | Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning Technical Papers Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China DOI |
16:20 - 17:40 | |||
16:20 20mTalk | AEON: A Method for Automatic Evaluation of NLP Test Cases Technical Papers Jen-tse Huang The Chinese University of Hong Kong, Jianping Zhang The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong DOI | ||
16:40 20mTalk | HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models Technical Papers DOI | ||
17:00 20mTalk | Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment Technical Papers Geunwoo Kim University of California, Irvine, USA, Sanghyun Hong Oregon State University, Michael Franz University of California, Irvine, Dokyung Song Yonsei University, South Korea DOI | ||
17:20 20mTalk | Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs Technical Papers Charaka Geethal Monash University, Thuan Pham The University of Melbourne, Aldeida Aleti Monash University, Marcel Böhme MPI-SP, Germany and Monash University, Australia DOI Pre-print |
18:00 - 18:40 | |||
18:00 20mTalk | Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing Technical Papers Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yicheng Wang Institute of Software Chinese Academy of Sciences, Zheng Qin Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
18:20 20mTalk | Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis Technical Papers Zhiyong Wu Tsinghua University, China, Jie Liang School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University DOI |
18:00 - 18:40 | |||
18:00 20mTalk | CIRCLE: Continual Repair across Programming Languages Technical Papers Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland DOI | ||
18:20 20mTalk | Program Vulnerability Repair via Inductive Inference Technical Papers Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore DOI |
Fri 22 JulDisplayed time zone: Seoul change
00:00 - 01:00 | |||
00:00 20mTalk | Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs Technical Papers DOI | ||
00:20 20mTalk | MDPFuzz: Testing Models Solving Markov Decision Processes Technical Papers Qi Pang HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology DOI | ||
00:40 20mTalk | SnapFuzz: High-Throughput Fuzzing of Network Applications Technical Papers DOI |
00:00 - 01:00 | |||
00:00 20mTalk | AEON: A Method for Automatic Evaluation of NLP Test Cases Technical Papers Jen-tse Huang The Chinese University of Hong Kong, Jianping Zhang The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong DOI | ||
00:20 20mTalk | Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study) Technical Papers DOI Pre-print | ||
00:40 20mTalk | ε-weakened Robustness of Deep Neural Networks Technical Papers Pei Huang State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Yuting Yang Institute of Computing Technology,Chinese Academy of Sciences; University of Chinese Academy of Sciences, Minghao Liu Institute of Software, Chinese Academy of Sciences, Fuqi Jia State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI |
01:40 - 02:20 | |||
01:40 20mTalk | Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation Technical Papers Yaowen Zheng Nanyang Technological University; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China;, Yuekang Li Nanyang Technological University, Cen Zhang Nanyang Technological University, Hongsong Zhu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University, Limin Sun Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China DOI | ||
02:00 20mTalk | TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving Technical Papers Xuwei Liu Purdue University, USA, Wei You Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI |
01:40 - 02:20 | |||
01:40 20mTalk | Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper Technical Papers Zhiming Li Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Singapore, Haoliang Li City University of Hong Kong, Zhengzi Xu Nanyang Technological University, Yi Li Nanyang Technological University, Yang Liu Nanyang Technological University DOI | ||
02:00 20mTalk | DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions Technical Papers Danning Xie Purdue University, Yitong Li University of Waterloo, Mijung Kim UNIST, Hung Viet Pham University of Waterloo, Lin Tan Purdue University, Xiangyu Zhang Purdue University, Michael W. Godfrey University of Waterloo, Canada DOI |
03:00 - 03:40 | |||
03:00 20mTalk | ATR: Template-based Repair for Alloy Specifications Technical Papers Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln DOI | ||
03:20 20mTalk | Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code Technical Papers DOI Pre-print |
03:00 - 03:40 | Session 1-14: Android ATechnical Papers at ISSTA 2 Chair(s): Christoph Csallner University of Texas at Arlington | ||
03:00 20mTalk | Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android Technical Papers Yifei Lu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Xuandong Li Nanjing University DOI | ||
03:20 20mTalk | NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper Technical Papers Hao Zhou The Hong Kong Polytechnic University, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Ting Wang Pennsylvania State University, Yajin Zhou Zhejiang University, Chao Zhang Tsinghua University, Haipeng Cai Washington State University, USA DOI |
07:00 - 08:00 | |||
07:00 20mTalk | PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation Technical Papers Zheyu Ma , Bodong Zhao Tsinghua University, Letu Ren Department of Computer Science and Technology, Tsinghua University, Zheming Li Tsinghua University, Siqi Ma the University of Queensland, Xiapu Luo Hong Kong Polytechnic University, Chao Zhang Tsinghua University DOI | ||
07:20 20mTalk | SLIME: Program-sensitive Energy Allocation for Fuzzing Technical Papers Chenyang Lyu Zhejiang University, Hong Liang Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Binbin Zhao Georgia Institute of Technology, Meng Han Binjiang Institute of Zhejiang University & Zhejiang University, Yun Li Huawei Technologies Co., Ltd., Zhe Wang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology DOI | ||
07:40 20mTalk | TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving Technical Papers Xuwei Liu Purdue University, USA, Wei You Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI |
07:00 - 08:20 | Session 2-14: Program Repair BTechnical Papers at ISSTA 2 Chair(s): Christoph Csallner University of Texas at Arlington | ||
07:00 20mTalk | ATR: Template-based Repair for Alloy Specifications Technical Papers Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln DOI | ||
07:20 20mTalk | CIRCLE: Continual Repair across Programming Languages Technical Papers Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland DOI | ||
07:40 20mTalk | Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code Technical Papers DOI Pre-print | ||
08:00 20mTalk | Program Vulnerability Repair via Inductive Inference Technical Papers Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore DOI |
08:40 - 09:40 | |||
08:40 20mTalk | eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts Technical Papers Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Karthik Pattabiraman University of British Columbia DOI | ||
09:00 20mTalk | Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper Technical Papers Ye Liu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Shang-Wei Lin Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden DOI Pre-print | ||
09:20 20mTalk | SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability Technical Papers Zeqin Liao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiao Chen Sun Yat-sen University, Yuhong Nan Sun Yat-sen University DOI |
15:00 - 16:20 | |||
15:00 20mTalk | Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper Technical Papers Ye Liu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Shang-Wei Lin Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden DOI Pre-print | ||
15:20 20mTalk | Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution Technical Papers Peilin Zheng Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University DOI | ||
15:40 20mTalk | SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability Technical Papers Zeqin Liao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiao Chen Sun Yat-sen University, Yuhong Nan Sun Yat-sen University DOI | ||
16:00 20mTalk | WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts Technical Papers Weimin Chen The Hong Kong Polytechnic University, Zihan Sun Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Haipeng Cai Washington State University, USA, Lei Wu Zhejiang University DOI |
15:00 - 16:20 | |||
15:00 20mTalk | ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems Technical Papers Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Zhenyu Chen Nanjing University DOI | ||
15:20 20mTalk | BET: Black-box Efficient Testing for Convolutional Neural Networks Technical Papers Wang Jialai Tsinghua University, Han Qiu Tsinghua University, Yi Rong Tsinghua University, Hengkai Ye Purdue University, Qi Li Tsinghua University, Zongpeng Li Tsinghua University, Chao Zhang Tsinghua University DOI | ||
15:40 20mTalk | Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study) Technical Papers DOI Pre-print | ||
16:00 20mTalk | ε-weakened Robustness of Deep Neural Networks Technical Papers Pei Huang State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Yuting Yang Institute of Computing Technology,Chinese Academy of Sciences; University of Chinese Academy of Sciences, Minghao Liu Institute of Software, Chinese Academy of Sciences, Fuqi Jia State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI |
16:40 - 17:40 | |||
16:40 20mTalk | An Extensive Study on Pre-trained Models for Program Understanding and Generation Technical Papers Zhengran Zeng Southern University of Science and Technology, Hanzhuo Tan Southern University of Science and Technology, The Hong Kong Polytechnic University, Haotian Zhang , Jing Li The Hong Kong Polytech University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
17:00 20mTalk | Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing Technical Papers Hasan Ferit Eniser MPI-SWS, Timo P. Gros Saarland University, Germany, Valentin Wüstholz ConsenSys, Jörg Hoffmann Saarland University and DFKI, Germany, Maria Christakis MPI-SWS DOI Pre-print | ||
17:20 20mTalk | TELL: Log Level Suggestions via Modeling Multi-level Code Block Information Technical Papers Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore DOI |
16:40 - 17:40 | |||
16:40 20mTalk | Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study) Technical Papers Pei Liu Monash University, Yanjie Zhao Monash University, Haipeng Cai Washington State University, USA, Mattia Fazzini University of Minnesota, John Grundy Monash University, Li Li Monash University DOI | ||
17:00 20mTalk | Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android Technical Papers Yifei Lu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Xuandong Li Nanjing University DOI | ||
17:20 20mTalk | NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper Technical Papers Hao Zhou The Hong Kong Polytechnic University, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Ting Wang Pennsylvania State University, Yajin Zhou Zhejiang University, Chao Zhang Tsinghua University, Haipeng Cai Washington State University, USA DOI |
18:00 - 19:00 | Session 3-13: Oracles, Models, and Measurement FTechnical Papers at ISSTA 1 Chair(s): Stefan Winter LMU Munich | ||
18:00 20mTalk | jTrans: Jump-Aware Transformer for Binary Code Similarity Detection Technical Papers Hao Wang Tsinghua University, Wenjie Qu Huazhong University of Science and Technology, Gilad Katz Ben-Gurion University of the Negev, Wenyu Zhu Tsinghua University, Zeyu Gao University of Science and Technology of China, Han Qiu Tsinghua University, Jianwei Zhuge Tsinghua University, Chao Zhang Tsinghua University DOI Pre-print | ||
18:20 20mTalk | FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases Technical Papers DOI Pre-print | ||
18:40 20mTalk | Hunting Bugs with Accelerated Optimal Graph Vertex Matching Technical Papers Xiaohui Zhang Renmin University of China, Yuanjun Gong Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wei You Renmin University of China, Wenchang Shi Renmin University of China, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI |
18:00 - 18:40 | |||
18:00 20mTalk | Detecting and Fixing Data Loss Issues in Android Apps Technical Papers Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University DOI | ||
18:20 20mTalk | PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications Technical Papers Shuaihao Yang Nanjing University of Science and Technology, Zigang Zeng Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI |
Accepted Papers
Call for Papers
[Updated Jan. 2022]
ISSTA invites three kinds of submissions. The clear majority of submissions is expected to be “Research Papers”, but submissions that best fit the description of “Experience Papers” or “Replicability Studies” should be submitted as such.
Research Papers
Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.
Experience Papers
Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of software testing and analysis methods or tools.
Replicability Studies
ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artifact only, but instead to perform a comparative experiment of multiple related approaches.
In particular, replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): The measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artifacts which they develop completely independently. This means that it is also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:
- Depth and breadth of experiments
- Clarity of writing
- Appropriateness of conclusions
- Amount of useful, actionable insights
- Availability of artifacts
We expect replicability studies to clearly point out the artifacts the study is built on, and to submit those artifacts to artifact evaluation (see below). Artifacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.
Submission Guidelines
Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for ISSTA. Authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions. More details are available at the Submission Policies page.
Research and Experience Papers as well as Replicability Studies should be at most 10 pages in length, with at most 2 additional pages for references. Experience papers and replicability studies should clearly specify their category in the paper title upon submission, e.g., “XXX (Experience Paper)”. All authors should use the official “ACM Master article template”, which can be obtained from the ACM Proceedings Template pages. Latex users should use the “sigconf” option, as well as the “review” (to produce line numbers for easy reference by the reviewers) and “anonymous” (omitting author names) options. To that end, the following latex code can be placed at the start of the latex document:
\documentclass[sigconf,review, anonymous]{acmart}
\acmConference[ISSTA 2022]{ACM SIGSOFT International Symposium on Software Testing and Analysis}{18-22 July, 2022}{Daejeon, South Korea}
Submit your papers via the HotCRP ISSTA 2022 submission website.
Double-blind Reviewing
ISSTA 2022 will conduct double-blind reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
Double-blind reviewing should not hinder the usual communication of results. But, during the review period, please don’t broadcast the work on social media. Also, to the extent possible, consider not publishing preprints of your work during or right before the review period.
Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.
Supplementary Material
Authors are free to provide supplementary material if that material supports the claims in the paper. Such material may include proofs, experimental results, and/or data sets. This material should be uploaded at the same time as the submission. Any supplementary material must also be anonymized. Reviewers are not required to examine the supplementary material but may refer to it if they would like to find further evidence supporting the claims in the paper. Please prepare the supplementary material in the PDF format.
Author Responses
Reviews will be followed by an author response. After the response, some papers may receive additional reviews, if necessary, to which authors can respond in a second author-response phase.
Visa Policy
In cases where the travel Visa is rejected or delayed for a long time (e.g., due to additional checks) so that the authors are not able to attend the conference despite best efforts, alternative presentation methods will be considered. However, the authors should notify the program chair at least one week before the conference and provide proof of visa being applied in time.