The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.
New for ISSTA 2023: Dual submission deadlines
ISSTA 2023 will feature two submission deadlines: An early submission deadline (November 10, 2022) and a regular submission deadline (February 16, 2023). You can choose to submit at either deadline, but papers submitted to the first deadline may receive a chance to submit a major revision of the initial submission to the regular deadline, addressing the reviewer comments. Papers submitted to the regular deadline will be decided using only the traditional paper outcomes of accept or reject.
Tue 18 JulDisplayed time zone: Pacific Time (US & Canada) change
08:00 - 08:30 | |||
08:00 30mCoffee break | Break ECOOP and ISSTA Catering |
08:30 - 09:00 | |||
09:00 - 10:00 | |||
09:00 60mKeynote | Towards Code-Aware Code Models ECOOP and ISSTA Keynotes |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break ECOOP and ISSTA Catering |
10:30 - 12:00 | ISSTA 1: Program Repair and DebuggingTechnical Papers at Amazon Auditorium (Gates G20) Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
10:30 15mTalk | Improving Spectrum-Based Localization of Multiple Faults by Iterative Test Suite Reduction Technical Papers DOI | ||
10:45 15mTalk | A Bayesian Framework for Automated Debugging Technical Papers DOI Pre-print | ||
11:00 15mTalk | ConfFix: Repairing Configuration Compatibility Issues in Android Apps Technical Papers Huaxun Huang Hong Kong University of Science and Technology, Chi Xu The Hong Kong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology DOI | ||
11:15 15mTalk | Quantitative Policy Repair for Access Control on the Cloud Technical Papers William Eiers University of California at Santa Barbara, Ganesh Sankaran University of California at Santa Barbara, Tevfik Bultan University of California at Santa Barbara DOI | ||
11:30 15mTalk | Automated Program Repair from Fuzzing Perspective Technical Papers YoungJae Kim Ulsan National Institute of Science and Technology, Seungheon Han Ulsan National Institute of Science and Technology, Askar Yeltayuly Khamit Ulsan National Institute of Science and Technology, Jooyong Yi UNIST (Ulsan National Institute of Science and Technology) DOI |
10:30 - 12:00 | ISSTA 2: Fuzzing 1Technical Papers at Smith Classroom (Gates G10) Chair(s): Jonathan Bell Northeastern University | ||
10:30 15mTalk | Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing Technical Papers Michael Chesser University of Adelaide, Surya Nepal CSIRO’s Data61, Damith C. Ranasinghe University of Adelaide DOI | ||
10:45 15mTalk | Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction Technical Papers Stephan Lipp TU Munich, Daniel Elsner TU Munich, Severin Kacianka TU Munich, Alexander Pretschner TU Munich, Marcel Böhme MPI-SP; Monash University, Sebastian Banescu TU Munich DOI | ||
11:00 15mTalk | ItyFuzz: Snapshot-Based Fuzzer for Smart Contract Technical Papers Chaofan Shou University of California at Santa Barbara, Shangyin Tan University of California at Berkeley, Koushik Sen University of California at Berkeley DOI | ||
11:15 15mTalk | Large Language Models Are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models Technical Papers Yinlin Deng University of Illinois at Urbana-Champaign, Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Haoran Peng University of Science and Technology of China, Chenyuan Yang University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
11:30 15mTalk | Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing Technical Papers Mingxi Ye Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Dongpeng Wu Sun Yat-sen University, Huizhong Li WeBank DOI | ||
11:45 15mTalk | Green Fuzzer Benchmarking Technical Papers DOI |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch ECOOP and ISSTA Catering |
13:30 - 15:00 | ISSTA 3: Deep-Learning for Software AnalysisTechnical Papers at Amazon Auditorium (Gates G20) Chair(s): Shiyi Wei University of Texas at Dallas | ||
13:30 15mTalk | API2Vec: Learning Representations of API Sequences for Malware Detection Technical Papers Lei Cui Zhongguancun Laboratory, Jiancong Cui University of Chinese Academy of Sciences; Institute of Information Engineering at Chinese Academy of Sciences, Yuede Ji University of North Texas, Zhiyu Hao Zhongguancun Laboratory, Lun Li Institute of Information Engineering at Chinese Academy of Sciences, Zhenquan Ding Institute of Information Engineering at Chinese Academy of Sciences DOI | ||
13:45 15mTalk | CONCORD: Clone-Aware Contrastive Learning for Source CodeACM SIGSOFT Distinguished Paper Technical Papers Yangruibo Ding Columbia University, Saikat Chakraborty Microsoft Research, Luca Buratti IBM Research, Saurabh Pujar IBM, Alessandro Morari IBM Research, Gail Kaiser Columbia University, Baishakhi Ray Columbia University DOI | ||
14:00 15mTalk | Type Batched Program Reduction Technical Papers DOI | ||
14:15 15mTalk | CodeGrid: A Grid Representation of Code Technical Papers Abdoul Kader Kaboré University of Luxembourg, Earl T. Barr University College London; Google DeepMind, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg DOI | ||
14:30 15mTalk | Guided Retraining to Enhance the Detection of Difficult Android Malware Technical Papers Nadia Daoudi University of Luxembourg, Kevin Allix CentraleSupélec, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg DOI | ||
14:45 15mTalk | Automatically Reproducing Android Bug Reports using Natural Language Processing and Reinforcement Learning Technical Papers Zhaoxu Zhang University of Southern California, Robert Winn University of Southern California, Yu Zhao University of Central Missouri, Tingting Yu University of Cincinnati, William G.J. Halfond University of Southern California DOI |
13:30 - 15:00 | ISSTA 4: Static AnalysisTechnical Papers at Smith Classroom (Gates G10) Chair(s): Christian Hammer University of Passau | ||
13:30 15mTalk | Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis Technical Papers Kai Cheng Shenzhen Institute of Advanced Technology at Chinese Academy of Sciences; Sangfor Technologies, Yaowen Zheng Nanyang Technological University, Tao Liu Pennsylvania State University, Le Guan University of Georgia, Peng Liu Pennsylvania State University, Hong Li Institute of Information Engineering at Chinese Academy of Sciences, Hongsong Zhu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kejiang Ye Shenzhen Institute of Advanced Technology at Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
13:45 15mTalk | Beware of the Unexpected: Bimodal Taint AnalysisACM SIGSOFT Distinguished Paper Technical Papers DOI | ||
14:00 15mTalk | OCFI: Make Function Entry Identification Hard Again Technical Papers Chengbin Pang Nanjing University, Tiantai Zhang Nanjing University, Xuelan Xu Nanjing University, Linzhang Wang Nanjing University, Bing Mao Nanjing University DOI | ||
14:15 15mTalk | Tai-e: A Developer-Friendly Static Analysis Framework for Java by Harnessing the Good Designs of Classics Technical Papers DOI Pre-print | ||
14:30 15mTalk | That’s a Tough Call: Studying the Challenges of Call Graph Construction for WebAssemblyACM SIGSOFT Distinguished Artifact Technical Papers Daniel Lehmann University of Stuttgart, Michelle Thalakottur Northeastern University, Frank Tip Northeastern University, Michael Pradel University of Stuttgart DOI | ||
14:45 15mTalk | Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly BinariesACM SIGSOFT Distinguished Paper Technical Papers Ningyu He Peking University, Zhehao Zhao Peking University, Jikai Wang Huazhong University of Science and Technology, Yubin Hu Beijing University of Posts and Telecommunications, Shengjian (Daniel) Guo Baidu Security, Haoyu Wang Huazhong University of Science and Technology, Guangtai Liang Huawei Cloud Computing Technologies, Ding Li Peking University, Xiangqun Chen Peking University, Yao Guo Peking University DOI |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break ECOOP and ISSTA Catering |
15:30 - 17:00 | ISSTA Online 1: SE and Deep LearningTechnical Papers at Smith Classroom (Gates G10) Chair(s): Myra Cohen Iowa State University | ||
15:30 10mTalk | COME: Commit Message Generation with Modification Embedding Technical Papers Yichen He Beihang University, Liran Wang Beihang University, Kaiyi Wang Beihang University, Yupeng Zhang Beihang University, Hang Zhang Beihang University, Zhoujun Li Beihang University DOI | ||
15:40 10mTalk | CODEP: Grammatical Seq2Seq Model for General-Purpose Code Generation Technical Papers DOI Pre-print | ||
15:50 10mTalk | Towards More Realistic Evaluation for Neural Test Oracle Generation Technical Papers DOI Pre-print | ||
16:00 10mTalk | Detecting Condition-Related Bugs with Control Flow Graph Neural Network Technical Papers Jian Zhang Beihang University, Xu Wang Beihang University, Hongyu Zhang Chongqing University, Hailong Sun Beihang University, Xudong Liu Beihang University, Chunming Hu Beihang University, Yang Liu Nanyang Technological University DOI | ||
16:10 10mTalk | RefBERT: A Two-Stage Pre-trained Framework for Automatic Rename Refactoring Technical Papers Hao Liu Xiamen University, Yanlin Wang Sun Yat-sen University, Zhao Wei Tencent, Yong Xu Tencent, Juhong Wang Tencent, Hui Li Xiamen University, Rongrong Ji Xiamen University DOI Pre-print | ||
16:20 10mTalk | Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? Technical Papers Yutao Hu Huazhong University of Science and Technology, Suyuan Wang Huazhong University of Science and Technology, Wenke Li Huazhong University of Science and Technology, Junru Peng Wuhan University, Yueming Wu Nanyang Technological University, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
16:30 10mTalk | Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and Beyond Technical Papers Ensheng Shi Xi’an Jiaotong University, Yanlin Wang Sun Yat-sen University, Hongyu Zhang Chongqing University, Lun Du Microsoft Research, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Hongbin Sun Xi’an Jiaotong University DOI |
15:30 - 17:00 | ISSTA Online 2: Static AnalysisTechnical Papers at Habib Classroom (Gates G01) Chair(s): Julian Dolby IBM Research | ||
15:30 10mTalk | Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree Technical Papers Tiancheng Hu Huazhong University of Science and Technology, Zijing Xu Huazhong University of Science and Technology, Yilin Fang Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Bin Yuan Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
15:40 10mTalk | Hybrid Inlining: A Framework for Compositional and Context-Sensitive Static Analysis Technical Papers Jiangchao Liu Ant Group; ByteDance, Jierui Liu Ant Group, Peng Di Ant Group, Diyu Wu Ant Group, Hengjie Zheng Ant Group, Alex X. Liu Ant Group, Jingling Xue UNSW DOI | ||
15:50 10mTalk | CGuard: Scalable and Precise Object Bounds Protection for C Technical Papers Piyus Kedia IIIT Delhi, Rahul Purandare University of Nebraska-Lincoln, Udit Kumar Agarwal University of British Columbia, Rishabh GGSIPU DOI | ||
16:00 10mTalk | Reducing the Memory Footprint of IFDS-Based Data-Flow Analyses using Fine-Grained Garbage CollectionACM SIGSOFT Distinguished Artifact Technical Papers DOI | ||
16:10 10mTalk | GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing Technical Papers Zihan Wang Shanghai Jiao Tong University, Pengbo Nie Shanghai Jiao Tong University, Xinyuan Miao Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Chengcheng Wan East China Normal University, Lei Bu Nanjing University, Jianjun Zhao Kyushu University DOI | ||
16:20 10mTalk | Splendor: Static Detection of Stored XSS in Modern Web Applications Technical Papers He Su Institute of Information Engineering at Chinese Academy of Sciences, Feng Li Institute of Information Engineering at Chinese Academy of Sciences, Lili Xu Institute of Information Engineering at Chinese Academy of Sciences, Wenbo Hu Institute of Information Engineering at Chinese Academy of Sciences, Yujie Sun Institute of Information Engineering at Chinese Academy of Sciences, Qing Sun Institute of Information Engineering at Chinese Academy of Sciences, Huina Chao Institute of Information Engineering at Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences DOI | ||
16:30 10mTalk | Improving Bit-Blasting for Nonlinear Integer ConstraintsACM SIGSOFT Distinguished Paper Technical Papers Fuqi Jia Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Rui Han Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Pei Huang Stanford University, Minghao Liu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Feifei Ma Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:40 10mTalk | Loop Invariant Inference through SMT Solving Enhanced Reinforcement Learning Technical Papers Shiwen Yu National University of Defense Technology, Ting Wang National University of Defense Technology, Ji Wang National University of Defense Technology DOI |
15:30 - 17:00 | ISSTA Online 3: Empirical StudiesTechnical Papers at Bezos Seminar Room (Gates G04) Chair(s): Jordan Samhi University of Luxembourg | ||
15:30 10mTalk | Understanding Breaking Changes in the Wild Technical Papers Dhanushka Jayasuriya University of Auckland, Valerio Terragni University of Auckland, Jens Dietrich Victoria University of Wellington, Samuel Ou University of Auckland, Kelly Blincoe University of Auckland DOI | ||
15:40 10mTalk | LiResolver: License Incompatibility Resolution for Open Source Software Technical Papers Sihan Xu Nankai University, Ya Gao Nankai University, Lingling Fan Nankai University, Linyu Li Nankai University, Xiangrui Cai Nankai University, Zheli Liu Nankai University DOI | ||
15:50 10mTalk | An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software Technical Papers Chao Li Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Rui Chen Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Boxiang Wang Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Zhixuan Wang Xidian University, Tingting Yu Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Yunsong Jiang Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Mengfei Yang China Academy of Space Technology DOI | ||
16:00 10mTalk | An Empirical Study of Functional Bugs in Android AppsACM SIGSOFT Distinguished Paper Technical Papers Yiheng Xiong East China Normal University, Mengqian Xu East China Normal University, Ting Su East China Normal University, Jingling Sun East China Normal University, Jue Wang Nanjing University, He Wen East China Normal University, Geguang Pu East China Normal University, Jifeng He East China Normal University, Zhendong Su ETH Zurich DOI | ||
16:10 10mTalk | Testing the Compiler for a New-Born Programming Language: An Industrial Case Study (Experience Paper) Technical Papers Yingquan Zhao Tianjin University, Junjie Chen Tianjin University, Ruifeng Fu Tianjin University, Haojie Ye Huawei, Zan Wang Tianjin University DOI | ||
16:20 10mTalk | An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors Technical Papers Kunlun Ren Huazhong University of Science and Technology, Qiang Weizhong Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, yi zhou Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
16:30 10mTalk | Security Checking of Trigger-Action-Programming Smart Home Integrations Technical Papers Lei Bu Nanjing University, Qiuping Zhang Nanjing University, Suwan Li Nanjing University, Jinglin Dai Nanjing University, Guangdong Bai University of Queensland, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences, Xuandong Li Nanjing University DOI | ||
16:40 10mTalk | Third-Party Library Dependency for Large-Scale SCA in the C/C++ Ecosystem: How Far Are We? Technical Papers Ling Jiang Southern University of Science and Technology, Hengchen Yuan Southern University of Science and Technology, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen Lab, Yuqun Zhang Southern University of Science and Technology DOI | ||
16:50 10mTalk | Who Judges the Judge: An Empirical Study on Online Judge Tests Technical Papers Kaibo Liu Peking University, Yudong Han Peking University, Jie M. Zhang King’s College London, Zhenpeng Chen University College London, Federica Sarro University College London, Mark Harman University College London, Gang Huang Peking University; National Key Laboratory of Data Space Technology and System, Yun Ma Peking University DOI |
17:30 - 20:30 | |||
Wed 19 JulDisplayed time zone: Pacific Time (US & Canada) change
08:00 - 08:30 | |||
08:00 30mCoffee break | Break ECOOP and ISSTA Catering |
08:30 - 09:15 | |||
08:30 45mKeynote | Reflections on the Impact of Calculating Source Line Level Energy Information for Android Applications ECOOP and ISSTA Keynotes |
09:15 - 10:00 | |||
09:15 45mKeynote | AITO Test of Time Award: Why Programming Languages Matter: Reflections on 45 Years of Language Design ECOOP and ISSTA Keynotes Pre-print Media Attached |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break ECOOP and ISSTA Catering |
10:30 - 12:00 | ISSTA 5: Improving Deep Learning SystemsTechnical Papers at Smith Classroom (Gates G10) Chair(s): Michael Pradel University of Stuttgart | ||
10:30 15mTalk | Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper) Technical Papers XuNie Huazhong University of Science and Technology; Beijing University of Posts and Telecommunications, Ningke Li Huazhong University of Science and Technology, Kailong Wang Huazhong University of Science and Technology, Shangguang Wang Beijing University of Posts and Telecommunications, Xiapu Luo Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology DOI | ||
10:45 15mTalk | Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis Technical Papers Xiangzhe Xu Purdue University, Shiwei Feng Purdue University, Yapeng Ye Purdue University, Guangyu Shen Purdue University, Zian Su Purdue University, Siyuan Cheng Purdue University, Guanhong Tao Purdue University, Qingkai Shi Purdue University, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI | ||
11:00 15mTalk | CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement Technical Papers Xuanqi Gao Xi’an Jiaotong University, Juan Zhai University of Massachusetts Amherst, Shiqing Ma UMass Amherst, Chao Shen Xi’an Jiaotong University, Yufei Chen Xi’an Jiaotong University; City University of Hong Kong, Shiwei Wang Xi’an Jiaotong University DOI Pre-print | ||
11:15 15mTalk | DeepAtash: Focused Test Generation for Deep Learning Systems Technical Papers DOI | ||
11:30 15mTalk | Systematic Testing of the Data-Poisoning Robustness of KNN Technical Papers Yannan Li University of Southern California, Jingbo Wang University of Southern California, Chao Wang University of Southern California DOI | ||
11:45 15mTalk | Semantic-Based Neural Network Repair Technical Papers DOI |
10:30 - 12:00 | ISSTA 6: Testing 1Technical Papers at Habib Classroom (Gates G01) Chair(s): Karine Even-Mendoza King’s College London | ||
10:30 15mTalk | Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing Technical Papers Julia Kaiwen Lau Monash University Malaysia, Kelvin Kai Wen Kong Monash University Malaysia, Julian Hao Yong Monash University Malaysia, Per Hoong Tan Monash University Malaysia, Zhou Yang Singapore Management University, Zi Qian Yong Monash University Malaysia, Joshua Chern Wey Low Monash University Malaysia, Chun Yong Chong Monash University Malaysia, Mei Kuan Lim Monash University Malaysia, David Lo Singapore Management University DOI | ||
10:45 15mTalk | PhysCov: Physical Test Coverage for Autonomous Vehicles Technical Papers Carl Hildebrandt University of Virginia, Meriel von Stein University of Virginia, Sebastian Elbaum University of Virginia Link to publication DOI Pre-print | ||
11:00 15mTalk | BehAVExplor: Behavior Diversity Guided Testing for Autonomous Driving Systems Technical Papers Mingfei Cheng Singapore Management University, Yuan Zhou Nanyang Technological University, Xiaofei Xie Singapore Management University DOI | ||
11:15 15mTalk | Building Critical Testing Scenarios for Autonomous Driving from Real Accidents Technical Papers Xudong Zhang Institute of Software at Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences DOI | ||
11:30 15mTalk | Virtual Reality (VR) Automated Testing in the Wild: A Case Study on Unity-Based VR Applications Technical Papers Dhia Elhaq Rzig University of Michigan - Dearborn, Nafees Iqbal University of Michigan at Dearborn, Isabella Attisano Villanova University, Xue Qin Villanova University, Foyzul Hassan University of Michigan at Dearborn DOI | ||
11:45 15mTalk | Concept-Based Automated Grading of CS-1 Programming Assignments Technical Papers Zhiyu Fan National University of Singapore, Shin Hwei Tan Concordia University, Canada, Abhik Roychoudhury National University of Singapore DOI |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch ECOOP and ISSTA Catering |
13:30 - 15:00 | ISSTA 7: Testing and Analysis of Machine-Learning SystemsTechnical Papers at Smith Classroom (Gates G10) Chair(s): Vincenzo Riccio University of Udine | ||
13:30 15mTalk | FairRec: Fairness Testing for Deep Recommender Systems Technical Papers Huizhong Guo Zhejiang University, Jinfeng Li Alibaba Group, Jingyi Wang Zhejiang University, Xiangyu Liu Alibaba Group, Dongxia Wang Zhejiang University, Zehong Hu Alibaba Group, Rong Zhang Alibaba Group, Hui Xue Alibaba Group DOI | ||
13:45 15mTalk | DyCL: Dynamic Neural Network Compilation Via Program Rewriting and Graph Optimization Technical Papers Simin Chen University of Texas at Dallas, Shiyi Wei University of Texas at Dallas, Cong Liu University of California at Riverside, Wei Yang University of Texas at Dallas DOI | ||
14:00 15mTalk | Validating Multimedia Content Moderation Software via Semantic Fusion Technical Papers Wenxuan Wang Chinese University of Hong Kong, Jingyuan Huang Chinese University of Hong Kong, Chang Chen Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Jianping Zhang Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Pinjia He Chinese University of Hong Kong, Michael Lyu Chinese University of Hong Kong DOI | ||
14:15 15mTalk | What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile Applications Technical Papers Linlin Li Southern University of Science and Technology, Ruifeng Wang Northeastern University, Xian Zhan Southern University of Science and Technology, Ying Wang Northeastern University, Cuiyun Gao Harbin Institute of Technology, Sinan Wang Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology DOI | ||
14:30 15mTalk | How Effective Are Neural Networks for Fixing Security Vulnerabilities Technical Papers Yi Wu Purdue University, Nan Jiang Purdue University, Hung Viet Pham University of Waterloo, Thibaud Lutellier University of Alberta, Jordan Davis Purdue University, Lin Tan Purdue University, Petr Babkin J.P. Morgan AI Research, Sameena Shah J.P. Morgan AI Research DOI | ||
14:45 15mTalk | ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems Technical Papers Mingyi Zhou Monash University, Xiang Gao Beihang University, Jing Wu Monash University, John Grundy Monash University, Xiao Chen Monash University, Chunyang Chen Monash University, Li Li Beihang University DOI |
13:30 - 15:00 | ISSTA 8: Fuzzing 2Technical Papers at Habib Classroom (Gates G01) Chair(s): Marcel Böhme MPI-SP; Monash University | ||
13:30 15mTalk | Guiding Greybox Fuzzing with Mutation TestingACM SIGSOFT Distinguished Paper Technical Papers Vasudev Vikram Carnegie Mellon University, Isabella Laybourn Carnegie Mellon University, Ao Li Carnegie Mellon University, Nicole Nair Swarthmore College, Kelton OBrien University of Minnesota, Rafaello Sanna University of Rochester, Rohan Padhye Carnegie Mellon University DOI Pre-print Media Attached | ||
13:45 15mTalk | Rare Path Guided Fuzzing Technical Papers Seemanta Saha University of California at Santa Barbara, Laboni Sarker University of California at Santa Barbara, Md Shafiuzzaman University of California at Santa Barbara, Chaofan Shou University of California at Santa Barbara, Albert Li University of California at Santa Barbara, Ganesh Sankaran University of California at Santa Barbara, Tevfik Bultan University of California at Santa Barbara DOI | ||
14:00 15mTalk | Finding Short Slow Inputs Faster with Grammar-Based Search Technical Papers DOI | ||
14:15 15mTalk | Fuzzing Embedded Systems using Debug Interfaces Technical Papers Max Eisele Robert Bosch; Saarland University, Daniel Ebert Robert Bosch, Christopher Huth Robert Bosch, Andreas Zeller CISPA Helmholtz Center for Information Security DOI Pre-print | ||
14:30 15mTalk | GrayC: Greybox Fuzzing of Compilers and Analysers for CACM SIGSOFT Distinguished Paper Technical Papers Karine Even-Mendoza King’s College London, Arindam Sharma Imperial College London, Alastair F. Donaldson Imperial College London, Cristian Cadar Imperial College London DOI | ||
14:45 15mTalk | Fuzzing Deep Learning Compilers with HirGen Technical Papers Haoyang Ma Hong Kong University of Science and Technology, Qingchao Shen Tianjin University, Yongqiang Tian University of Waterloo, Junjie Chen Tianjin University, Shing-Chi Cheung Hong Kong University of Science and Technology DOI |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break ECOOP and ISSTA Catering |
15:30 - 17:00 | ISSTA Online 4: Testing and Analysis of DL SystemsTechnical Papers at Smith Classroom (Gates G10) Chair(s): Elena Sherman Boise State University | ||
15:30 10mTalk | A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation Technical Papers Zhiyi Xue East China Normal University, Si Liu ETH Zurich, Zhaodi Zhang East China Normal University, Yiting Wu East China Normal University, Min Zhang East China Normal University DOI | ||
15:40 10mTalk | In Defense of Simple Techniques for Neural Network Test Case Selection Technical Papers Shenglin Bao Fudan University, Chaofeng Sha Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University, Wenyun Zhao Fudan University DOI | ||
15:50 10mTalk | ROME: Testing Image Captioning Systems via Recursive Object Melting Technical Papers BoXi Yu Chinese University of Hong Kong, Zhiqing Zhong Chinese University of Hong Kong, Jiaqi Li Chinese University of Hong Kong, Yixing Yang Chinese University of Hong Kong, Shilin He Microsoft Research, Pinjia He Chinese University of Hong Kong DOI | ||
16:00 10mTalk | ACETest: Automated Constraint Extraction for Testing Deep Learning Operators Technical Papers Jingyi Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Xiao Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yuekang Li University of New South Wales, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, DongSong Yu Zhongguancun Laboratory, Chendong Yu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Hui Su Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yufeng Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences DOI | ||
16:10 10mTalk | Latent Imitator: Generating Natural Individual Discriminatory Instances for Black-Box Fairness Testing Technical Papers Yisong Xiao Beihang University, Aishan Liu Beihang University; Institute of Dataspace, Li Tianlin Nanyang Technological University, Xianglong Liu Beihang University; Institute of Dataspace; Zhongguancun Laboratory DOI | ||
16:20 10mTalk | CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems Technical Papers Quan Zhang Tsinghua University, Yongqiang Tian University of Waterloo, Yifeng Ding University of Illinois at Urbana-Champaign, Shanshan Li National University of Defense Technology, Chengnian Sun University of Waterloo, Yu Jiang Tsinghua University, Jiaguang Sun Tsinghua University DOI | ||
16:30 10mTalk | Back Deduction Based Testing for Word Sense Disambiguation Ability of Machine Translation Systems Technical Papers Jun Wang Nanjing University, Yanhui Li Nanjing University, Xiang Huang Nanjing University, Lin Chen Nanjing University, Xiaofang Zhang Soochow University, Yuming Zhou Nanjing University DOI | ||
16:40 10mTalk | CydiOS: A Model-Based Testing Framework for iOS Apps Technical Papers Shuohan Wu Hong Kong Polytechnic University, Jianfeng Li Xi’an Jiaotong University, Hao Zhou Hong Kong Polytechnic University, Yongsheng Fang Beijing University of Posts and Telecommunications, Kaifa ZHAO Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Chenxiong Qian University of Hong Kong, Xiapu Luo Hong Kong Polytechnic University DOI |
15:30 - 17:00 | ISSTA Online 5: Domain-Specific TestingTechnical Papers at Habib Classroom (Gates G01) Chair(s): Michal Young University of Oregon | ||
15:30 10mTalk | DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity Technical Papers Zhuo Chen Zhejiang University; Ant Group, Jie Liu Ant Group, Yubo Hu Xidian University, Lei Wu Zhejiang University, Yajin Zhou Zhejiang University, Yiling He Zhejiang University, Xianhao Liao Ant Group, Ke Wang Ant Group, Jinku Li Xidian University, Zhan Qin Zhejiang University DOI | ||
15:40 10mTalk | Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation Technical Papers Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Haoxiang Jia Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Xiaotong Huang Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
15:50 10mTalk | DDLDroid: Efficiently Detecting Data Loss Issues in Android Apps Technical Papers Yuhao Zhou Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI | ||
16:00 10mTalk | Exploring Missed Optimizations in WebAssembly Optimizers Technical Papers Zhibo Liu Hong Kong University of Science and Technology, Dongwei Xiao Hong Kong University of Science and Technology, Li Zongjie Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Wei Meng Chinese University of Hong Kong DOI | ||
16:10 10mTalk | Vectorizing Program Ingredients for Better JVM Testing Technical Papers Tianchang Gao Tianjin University, Junjie Chen Tianjin University, Yingquan Zhao Tianjin University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
16:20 10mTalk | 1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing Technical Papers Songtao Yang Tsinghua University, Yubo He Information Engineering University, Kaixiang Chen Tsinghua University, Zheyu Ma Tsinghua University, Xiapu Luo Hong Kong Polytechnic University, Yong Xie Qinghai University, Jianjun Chen Tsinghua University, Chao Zhang Tsinghua University DOI | ||
16:30 10mTalk | SBDT: Search-Based Differential Testing of Certificate Parsers in SSL/TLS Implementations Technical Papers Chu Chen Qufu Normal University, Pinghong Ren Qufu Normal University, Zhenhua Duan Xidian University, Cong Tian Xidian University, Xu Lu Xidian University, Bin Yu Xidian University DOI | ||
16:40 10mTalk | Silent Compiler Bug De-duplication via Three-Dimensional Analysis Technical Papers Chen Yang Tianjin University, Junjie Chen Tianjin University, Xingyu Fan Tianjin University, Jiajun Jiang Tianjin University, Jun Sun Singapore Management University DOI | ||
16:50 10mTalk | Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features Technical Papers Yiming Zhang Southern University of Science and Technology; Hong Kong Polytechnic University, Yuxin Hu Southern University of Science and Technology, Haonan Li Southern University of Science and Technology, Wenxuan Shi Southern University of Science and Technology, Zhenyu Ning Hunan University; Southern University of Science and Technology, Xiapu Luo Hong Kong Polytechnic University, Fengwei Zhang Southern University of Science and Technology DOI |
15:30 - 17:00 | ISSTA Online 6: Smart Contracts and AutomotiveTechnical Papers at Bezos Seminar Room (Gates G04) Chair(s): Alex Groce Northern Arizona University | ||
15:30 10mTalk | SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis Technical Papers Zeqin Liao Sun Yat-sen University, Sicheng Hao Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
15:40 10mTalk | DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols Technical Papers Queping Kong Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Zigui Jiang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
15:50 10mTalk | Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts Technical Papers Yuzhou Fang Hong Kong University of Science and Technology, Daoyuan Wu Chinese University of Hong Kong, Xiao Yi Chinese University of Hong Kong, Shuai Wang Hong Kong University of Science and Technology, Yufan Chen Xidian University, Mengjie Chen Mask Network, Yang Liu Nanyang Technological University, Lingxiao Jiang Singapore Management University DOI | ||
16:00 10mTalk | Testing Automated Driving Systems by Breaking Many Laws Efficiently Technical Papers Xiaodong Zhang Xidian University, Zhao Wei Tencent, Yang Sun Singapore Management University, Jun Sun Singapore Management University, Yulong Shen Xidian University, Xuewen Dong Xidian University, Zijiang Yang GuardStrike DOI | ||
16:10 10mTalk | Simulation-Based Validation for Autonomous Driving Systems Technical Papers Changwen Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Joseph Sifakis University Grenoble Alpes; CNRS; Grenoble INP; VERIMAG, Qiang Wang Academy of Military Sciences, Rongjie Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:20 10mTalk | Data Constraint Mining for Automatic Reconciliation Scripts Generation Technical Papers Tianxiao Wang Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Chen Zhi Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Xiaoqun Zhou Alibaba Group, Jinjie Wu Alibaba Group, Jianwei Yin Zhejiang University, Shuiguang Deng Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies DOI |
17:30 - 20:30 | |||
Thu 20 JulDisplayed time zone: Pacific Time (US & Canada) change
08:00 - 08:30 | |||
08:00 30mCoffee break | Break ECOOP and ISSTA Catering |
08:30 - 09:00 | |||
08:30 30mAwards | ECOOP: Dahl-Nygaard Prize Ceremony and Awards ECOOP and ISSTA Keynotes |
09:00 - 10:00 | |||
09:00 60mKeynote | Dahl-Nygaard Senior Prize: Safe Journeys into the Unknown – Object Capabilities ECOOP and ISSTA Keynotes Media Attached |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break ECOOP and ISSTA Catering |
10:30 - 12:00 | ISSTA 9: Testing 2Technical Papers at Amazon Auditorium (Gates G20) Chair(s): Cristian Cadar Imperial College London | ||
10:30 15mTalk | A Comprehensive Study on Quality Assurance Tools for Java Technical Papers Han Liu East China Normal University, Sen Chen Tianjin University, Ruitao Feng UNSW, Chengwei Liu Nanyang Technological University, Kaixuan Li East China Normal University, Zhengzi Xu Nanyang Technological University, Liming Nie Nanyang Technological University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University DOI | ||
10:45 15mTalk | Transforming Test Suites into Croissants Technical Papers Yang Chen University of Illinois at Urbana-Champaign, Alperen Yildiz Sabanci University, Darko Marinov University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign DOI | ||
11:00 15mTalk | SlipCover: Near Zero-Overhead Code Coverage for Python Technical Papers Juan Altmayer Pizzorno University of Massachusetts Amherst, Emery D. Berger University of Massachusetts Amherst DOI | ||
11:15 15mTalk | To Kill a Mutant: An Empirical Study of Mutation Testing Kills Technical Papers Hang Du University of California at Irvine, Vijay Krishna Palepu Microsoft, James Jones University of California at Irvine DOI | ||
11:30 15mTalk | Systematically Producing Test Orders to Detect Order-Dependent Flaky Tests Technical Papers Chengpeng Li University of Texas at Austin, M. Mahdi Khosravi Middle East Technical University, Wing Lam George Mason University, August Shi University of Texas at Austin DOI | ||
11:45 15mTalk | Extracting Inline Tests from Unit Tests Technical Papers Yu Liu University of Texas at Austin, Pengyu Nie University of Texas at Austin, Anna Guo University of Texas at Austin, Milos Gligoric University of Texas at Austin, Owolabi Legunsen Cornell University DOI |
10:30 - 12:00 | ISSTA 10: Test OptimizationsTechnical Papers at Smith Classroom (Gates G10) Chair(s): Wing Lam University of Illinois at Urbana-Champaign | ||
10:30 15mTalk | More Precise Regression Test Selection via Reasoning about Semantics-Modifying ChangesACM SIGSOFT Distinguished Paper Technical Papers Yu Liu University of Texas at Austin, Jiyang Zhang University of Texas at Austin, Pengyu Nie University of Texas at Austin, Milos Gligoric University of Texas at Austin, Owolabi Legunsen Cornell University DOI | ||
10:45 15mTalk | Catamaran: Low-Overhead Memory Safety Enforcement via Parallel Acceleration Technical Papers Yiyu Zhang Nanjing University, Tianyi Liu Nanjing University, Zewen Sun Nanjing University, Zhe Chen Nanjing University of Aeronautics and Astronautics, Xuandong Li Nanjing University, Zhiqiang Zuo Nanjing University DOI | ||
11:00 15mTalk | Applying and Extending the Delta Debugging Algorithm for Elevator Dispatching Algorithms (Experience Paper) Technical Papers DOI Pre-print | ||
11:15 15mTalk | June: A Type Testability Transformation for Improved ATG Performance Technical Papers Dan Bruce University College London, David Kelly King’s College London, Hector Menendez King’s College London, Earl T. Barr University College London; Google DeepMind, David Clark University College London DOI | ||
11:30 15mTalk | Pattern-Based Peephole Optimizations with Java JIT Tests Technical Papers Zhiqiang Zang University of Texas at Austin, Aditya Thimmaiah University of Texas at Austin, Milos Gligoric University of Texas at Austin DOI Pre-print | ||
11:45 15mTalk | GPUHarbor: Testing GPU Memory Consistency at Large (Experience Paper)ACM SIGSOFT Distinguished Artifact Technical Papers Reese Levine University of California at Santa Cruz, Mingun Cho University of California at Davis, Devon McKee University of California at Santa Cruz, Andrew Quinn University of California at Santa Cruz, Tyler Sorensen University of California at Santa Cruz DOI |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch ECOOP and ISSTA Catering |
13:30 - 15:00 | ISSTA 11: Testing 3Technical Papers at Amazon Auditorium (Gates G20) Chair(s): Marcelo d'Amorim North Carolina State University | ||
13:30 15mTalk | Dependency-Aware Metamorphic Testing of Datalog Engines Technical Papers DOI | ||
13:45 15mTalk | GDsmith: Detecting Bugs in Cypher Graph Database Engines Technical Papers Ziyue Hua Peking University, Wei Lin Peking University, Luyao Ren Peking University, Zongyang Li Peking University, Lu Zhang Peking University, Wenpin Jiao Peking University, Tao Xie Peking University DOI | ||
14:00 15mTalk | Testing Graph Database Engines via Query Partitioning Technical Papers Matteo Kamm ETH Zurich, Manuel Rigger National University of Singapore, Chengyu Zhang ETH Zurich, Zhendong Su ETH Zurich DOI | ||
14:15 15mTalk | Toward Automated Detecting Unanticipated Price Feed in Smart Contract Technical Papers Yifan Mo Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
14:30 15mTalk | Definition and Detection of Defects in NFT Smart Contracts Technical Papers Shuo Yang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI |
13:30 - 15:00 | ISSTA 12: Web and Smart ContractsTechnical Papers at Smith Classroom (Gates G10) Chair(s): Martin Kellogg New Jersey Institute of Technology | ||
13:30 15mTalk | Enhancing REST API Testing with NLP Techniques Technical Papers Myeongsoo Kim Georgia Institute of Technology, Davide Corradini University of Verona, Saurabh Sinha IBM Research, Alessandro Orso Georgia Institute of Technology, Michele Pasqua University of Verona, Rachel Tzoref-Brill IBM Research, Mariano Ceccato University of Verona DOI | ||
13:45 15mTalk | AGORA: Automated Generation of Test Oracles for REST APIsACM SIGSOFT Distinguished Artifact Technical Papers Juan C. Alonso University of Seville, Sergio Segura University of Seville, Antonio Ruiz-Cortés University of Seville DOI | ||
14:00 15mTalk | ωTest: WebView-Oriented Testing for Android Applications Technical Papers Jiajun Hu Hong Kong University of Science and Technology, Lili Wei McGill University, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology DOI | ||
14:15 15mTalk | NodeRT: Detecting Races in Node.js Applications Practically Technical Papers Jingyao Zhou Nanjing University, Lei Xu Nanjing University, Gongzheng Lu Suzhou City University, Weifeng Zhang Nanjing University of Posts and Telecommunications, Xiangyu Zhang Purdue University DOI | ||
14:30 15mTalk | iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements Technical Papers Pengcheng Fang Case Western Reserve University, Zhenhua Zou Tsinghua University, Xusheng Xiao Arizona State University, Zhuotao Liu Tsinghua University DOI | ||
14:45 15mTalk | Automated Generation of Security-Centric Descriptions for Smart Contract BytecodeACM SIGSOFT Distinguished Paper Technical Papers Yu Pan University of Utah, Zhichao Xu University of Utah, Levi Taiji Li University of Utah, Yunhe Yang University of Utah, Mu Zhang University of Utah DOI |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break ECOOP and ISSTA Catering |
15:30 - 17:00 | |||
15:30 60mKeynote | Machine Learning for Software Engineering ECOOP and ISSTA Keynotes | ||
16:30 15mDay closing | ISSTA'24 Preview ECOOP and ISSTA Keynotes | ||
16:45 15mDay closing | ISSTA Closing ECOOP and ISSTA Keynotes |
17:30 - 18:30 | |||
Accepted Papers
Call for Papers
ISSTA invites three kinds of submissions. The clear majority of submissions is expected to be “Research Papers”, but submissions that best fit the description of “Experience Papers” or “Replicability Studies” should be submitted as such.
Research Papers
Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.
Experience Papers
Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of software testing and analysis methods or tools.
Replicability Studies
ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artifact only, but instead to perform a comparative experiment of multiple related approaches.
In particular, replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): The measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artifacts which they develop completely independently. This means that it is also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:
- Depth and breadth of experiments
- Clarity of writing
- Appropriateness of conclusions
- Amount of useful, actionable insights
- Availability of artifacts
We expect replicability studies to clearly point out the artifacts the study is built on, and to submit those artifacts to artifact evaluation (see below). Artifacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.
Dual Submission Deadlines and Major Revisions
ISSTA 2023 features two submission deadlines: An early submission deadline (November 10, 2022) and a regular submission deadline (February 16, 2023). The instructions in this call apply to both deadlines. You can choose to submit at either deadline, but only papers submitted to the first deadline may receive a chance to submit a major revision of the initial submission to the regular deadline, addressing the reviewer comments. Papers submitted to the regular deadline will be decided using only the traditional paper outcomes of accept or reject.
Submission Guidelines
Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for ISSTA. Authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.
Research Papers, Experience Papers, and Replicability Studies should be at most 10 pages in length, with at most 2 additional pages for references. Experience papers and replicability studies should clearly specify their category in the paper title upon submission, e.g., “XXX (Experience Paper)”. All authors should use the official “ACM Master article template”, which can be obtained from the ACM Proceedings Template pages. Latex users should use the “sigconf” option, as well as the “review” (to produce line numbers for easy reference by the reviewers) and “anonymous” (omitting author names) options. To that end, the following Latex code can be placed at the start of the Latex document:
\documentclass[sigconf,review, anonymous]{acmart}
\acmConference[ISSTA 2023]{ACM SIGSOFT International Symposium on Software Testing and Analysis}{17-21 July, 2023}{Seattle, USA}
Submit your papers via the HotCRP ISSTA 2023 submission website.
Each submission will be reviewed by at least three members of the program committee. Authors will have an opportunity to respond to reviews during a rebuttal period. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation and appropriate comparison to related work. Some papers may have more than three reviews, as the PC chair may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The authors will have a chance to read the additional reviews and respond to them during the additional short response period. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.
Double-blind Reviewing
ISSTA 2023 will conduct double-blind reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
Double-blind reviewing should not hinder the usual communication of results. But, during the review period, please don’t broadcast the work on social media. Also, to the extent possible, consider not publishing preprints of your work during or right before the review period. If the authors have already published a version of their paper to arXiv or similar sites, we request authors to use a different title for their submission, so that author names are not inadvertently disclosed, e.g., via a notification on Google Scholar.
Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.
Open Science Policy
ISSTA has adopted an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.
Upon submission, authors are asked to make their data available to the program committee (via upload of anonymized supplemental material or a link to an anonymized private or public repository) or to comment on why this is not possible or desirable. While sharing such a repository is not mandatory for submission or acceptance, this information will be passed to the program committee to inform its decision. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance.
Authors Take Note:
The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of your conference. The official publication date affects the deadline for any patent filings related to published work.