Research PapersISSTA 2025
About
The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.
Wed 25 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
11:00 - 12:30 | Program RepairResearch Papers / Tool Demonstrations at Aurora A Chair(s): Yannic Noller Ruhr University Bochum | ||
11:00 25mTalk | OmniGIRL: A Multilingual and Multimodal Benchmark for GitHub Issue Resolution Research Papers Lianghong Guo Sun Yat-sen University, Wei Tao Independent Researcher, Runhan Jiang Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Xilin Liu Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies, Mingzhi Mao Sun Yat-sen University, Hongyu Zhang Chongqing University, Zibin Zheng Sun Yat-sen University | ||
11:25 25mTalk | PatchScope: LLM-Enhanced Fine-Grained Stable Patch Classification for Linux Kernel Research Papers Rongkai Liu Central South University, Heyuan Shi Central South University, Shuning Liu Central South University, China, Chao Hu Central South University, Sisheng Li Central South University, China, Yuheng Shen Tsinghua University, Runzhe Wang Alibaba Group, Xiaohai Shi Alibaba Group, Yu Jiang Tsinghua University | ||
11:50 25mTalk | AdverIntent-Agent: Adversarial Reasoning for Repair Based on Inferred Program Intent Research Papers He Ye University College London (UCL), Aidan Z.H. Yang Carnegie Mellon University, Chang Hu Macau University of Science and Technology, Yanlin Wang Sun Yat-sen University, Tao Zhang Macau University of Science and Technology, Claire Le Goues Carnegie Mellon University | ||
12:15 15mDemonstration | InfraFix: Technology-Agnostic Repair of Infrastructure as Code Tool Demonstrations Nuno Saavedra INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC |
11:00 - 12:15 | |||
11:00 25mTalk | Beyond Static Pattern Matching? Rethinking Automatic Cryptographic API Misuse Detection in the Era of LLMs Research Papers Yifan Xia , Zichen Xie Zhejiang University, China, Peiyu Liu Zhejiang University, Kangjie Lu University of Minnesota, Yan Liu Ant Group, Wenhai Wang Zhejiang University, Shouling Ji Zhejiang University | ||
11:25 25mTalk | Pepper: Preference-Aware Active Trapping for Ransomware Research Papers Huan Zhang Institute of Information Engineering, Chinese Academy of Sciences, Zhengkai Qin Institute of Information Engineering,Chinese Academy of Sciences, Lixin Zhao Institute of Information Engineering,Chinese Academy of Sciences, Aimin Yu Institute of Information Engineering, Chinese Academy of Sciences, Lijun Cai Institute of Information Engineering,Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
11:50 25mTalk | ICEPRE: ICS protocol reverse engineering via data-driven concolic execution Research Papers Yibo Qu Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Zhen Wang Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Jiaxing Cheng Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Shuaizong Si Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Yongle Chen Taiyuan University of Technology, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences |
11:00 - 12:15 | Systems and PerformanceResearch Papers at Aurora C Chair(s): Lars Grunske Humboldt-Universität zu Berlin | ||
11:00 25mTalk | Preventing Disruption of System Backup Against Ransomware Attacks Research Papers Yiwei Hou Tsinghua University, Lihua Guo Tsinghua University, Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Wenhuan Liu Tsinghua University/Union Tech, Chengnian Sun University of Waterloo, Yu Jiang Tsinghua University | ||
11:25 25mTalk | Rethinking Performance Analysis for Configurable Software Systems: A Case Study from a Fitness Landscape Perspective Research Papers Mingyu Huang University of Electronic Science and Technology of China, Peili Mao University of Electronic Science and Technology of China, Ke Li University of Exeter | ||
11:50 25mTalk | Hulk: Exploring Data-Sensitive Performance Anomalies in DBMSs via Data-Driven Analysis Research Papers Zhiyong Wu Tsinghua University, China, Jie Liang , Jingzhou Fu School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Yu Jiang Tsinghua University |
11:00 - 12:15 | Fairness and LLM TestingResearch Papers at Cosmos 3A Chair(s): Andreas Metzger University of Duisburg-Essen | ||
11:00 25mTalk | Fairness Mediator: Neutralize Stereotype Associations to Mitigate Bias in Large Language Models Research Papers Yisong Xiao Beihang University, Aishan Liu Beihang University; Institute of Dataspace, Siyuan Liang National University of Singapore, Xianglong Liu Beihang University; Institute of Dataspace; Zhongguancun Laboratory, Dacheng Tao Nanyang Technological University | ||
11:25 25mTalk | ClassEval-T: Evaluating Large Language Models in Class-Level Code Translation Research Papers Pengyu Xue Shandong University, Linhao Wu Shandong University, Zhen Yang Shandong University, Chengyi Wang Shandong University, Xiang Li Shandong University, Yuxiang Zhang Shandong University, Jia Li Peking University, Ruikai Jin Shandong University, Yifei Pei Shandong University, Zhaoyan Shen Shandong University, Xiran Lyu Shandong University, Jacky Keung City University of Hong Kong | ||
11:50 25mTalk | No Bias Left Behind: Fairness Testing for Deep Recommender Systems Targeting General Disadvantaged Groups Research Papers Zhuo Wu Tianjin International Engineering Institute, Tianjin University, Zan Wang Tianjin University, Chuan Luo Beihang University, Xiaoning Du Monash University, Junjie Chen Tianjin University |
14:00 - 15:15 | |||
14:00 25mTalk | Productively Deploying Emerging Models on Emerging Platforms: A Top-Down Approach for Testing and Debugging Research Papers Siyuan Feng Shanghai Jiao Tong University, Jiawei Liu University of Illinois at Urbana-Champaign, Ruihang Lai Carnegie Mellon University, Charlie F. Ruan Carnegie Mellon University, Yong Yu Shanghai Jiao Tong University, Lingming Zhang University of Illinois at Urbana-Champaign, Tianqi Chen | ||
14:25 25mTalk | SWE-GPT: A Process-Centric Language Model for Automated Software Improvement Research Papers Yingwei Ma Alibaba Group, Rongyu Cao Tongyi Lab, Alibaba, China, Yongchang Cao Tongyi Lab, Alibaba, China, Yue Zhang Tongyi Lab, Alibaba, China, Jue Chen Tongyi Lab, Alibaba, China, Yibo Liu Tongyi Lab, Alibaba, China, Yuchen Liu Tongyi Lab, Alibaba, China, Binhua Li Tongyi Lab, Alibaba, China, Fei Huang Tongyi Lab, Alibaba, China, Yongbin Li Tongyi Lab, Alibaba, China | ||
14:50 25mTalk | What Happened in This Pipeline? Diffing Build Logs With CiDiff Research Papers Nicolas Hubner University of Bordeaux, LaBRI, UMR 5800, F-33400, Talence, France, Jean-Rémy Falleri Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, Institut Universitaire de France, Raluca Uricaru Univ. Bordeaux, Bordeaux INP, CNRS, LaBRI, UMR5800, F-33400 Talence, France, Thomas Degueule CNRS, Thomas Durieux TU Delft |
14:00 - 15:15 | |||
14:00 25mTalk | MoDitector: Module-Directed Testing for Autonomous Driving Systems Research Papers Renzhi Wang University of Alberta, Mingfei Cheng Singapore Management University, Xiaofei Xie Singapore Management University, Yuan Zhou Zhejiang Sci-Tech University, Lei Ma The University of Tokyo & University of Alberta | ||
14:25 25mTalk | RouthSearch: Inferring PID Parameter Specification for Flight Control Program by Coordinate Search Research Papers Siao Wang Fudan University, Zhen Dong Fudan University, Hui Li Fudan University, China, Liwei Shen Fudan University, China, Xin Peng Fudan University, Dongdong She HKUST (The Hong Kong University of Science and Technology) | ||
14:50 25mTalk | Testing the Fault-Tolerance of Multi-Sensor Fusion Perception in Autonomous Driving Systems Research Papers Haoxiang Tian Institute of Software, Chinese Academy of Sciences, wenqiang ding Nanjing Institute of Software, Nanjing, China, Xingshuo Han Nanyang Technological University, Singapore, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, An Guo Nanjing University, Junqi Zhang University of Science and Technology of China, China, Wei Chen Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tianwei Zhang Nanyang Technological University |
14:00 - 15:15 | |||
14:00 25mTalk | Adding Spatial Memory Safety to EDK II through Checked C (Experience Paper) Research Papers Sourag Cherupattamoolayil Purdue University, Arunkumar Bhattar Purdue University, Connor Everett Glosner Purdue University, Aravind Machiry Purdue University | ||
14:25 25mTalk | LogBase: A Large-Scale Benchmark for Semantic Log Parsing Research Papers Chenbo Zhang Fudan University, Wenying Xu Fudan University, Jinbu Liu Alibaba, Lu Zhang Fudan University, Guiyang Liu Alibaba, Jihong Guan Tongji University, Qi Zhou Alibaba, Shuigeng Zhou Fudan University | ||
14:50 25mTalk | Static Program Reduction via Type-Directed Slicing Research Papers Loi Ngo Duc Nguyen University of California, Riverside, Tahiatul Islam New Jersey Institute of Technology, Theron Wang The Academy for Mathematics, Science & Engineering, USA, Sam Lenz New Jersey Institute of Technology, Martin Kellogg New Jersey Institute of Technology Pre-print |
14:00 - 15:30 | LLM-based Testing 1Research Papers / Tool Demonstrations at Cosmos 3A Chair(s): Qingkai Shi Nanjing University | ||
14:00 25mTalk | A Large-scale Empirical Study on Fine-tuning Large Language Models for Unit Testing Research Papers ye shang Nanjing University, Quanjun Zhang School of Computer Science and Engineering, Nanjing University of Science and Technology, Chunrong Fang Nanjing University, Siqi Gu Nanjing University, Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Zhenyu Chen Nanjing University | ||
14:25 25mTalk | Validating Network Protocol Parsers with Traceable RFC Document Interpretation Research Papers Mingwei Zheng Purdue University, Danning Xie Purdue University, Qingkai Shi Nanjing University, Chengpeng Wang Purdue University, Xiangyu Zhang Purdue University | ||
14:50 25mTalk | Tratto: A Neuro-Symbolic Approach to Deriving Axiomatic Test Oracles Research Papers Davide Molinelli USI Lugano; Schaffhausen Institute of Technology, Alberto Martin-Lopez Software Institute - USI, Lugano, Elliott Zackrone University of Washington, Beyza Eken Sakarya University, Michael D. Ernst University of Washington, Mauro Pezze Università della Svizzera italiana (USI) and Università degli Studi di Milano Bicocca and CIT Constructor Institute of Technology Pre-print | ||
15:15 15mDemonstration | Kitten: A Simple Yet Effective Baseline for Evaluating LLM-Based Compiler Testing Techniques Tool Demonstrations Yuanmin Xie Tsinghua University, Zhenyang Xu University of Waterloo, Yongqiang Tian , Min Zhou , Xintong Zhou University of Waterloo, Chengnian Sun University of Waterloo |
16:00 - 17:30 | Mobile and Concurrency TestingResearch Papers / Tool Demonstrations at Aurora A Chair(s): Li Li Beihang University | ||
16:00 25mTalk | Intention-based GUI Test Migration for Mobile Apps using Large Language Models Research Papers Shaoheng Cao Nanjing University, Minxue Pan Nanjing University, Yuanhong Lan Nanjing University, Xuandong Li Nanjing University | ||
16:25 25mTalk | GoPV: Detecting Blocking Concurrency Bugs Related to Shared-Memory Synchronization in Go Research Papers Wei Song Nanjing University of Science and Technology, Xiaofan Xu Nanjing University of Science and Technology, Jeff Huang Texas A&M University | ||
16:50 25mTalk | Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection Research Papers haodong li Beijing University of Posts and Telecommunications, Xiao Cheng UNSW, Yanjie Zhao Huazhong University of Science and Technology, Guosheng Xu Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology, Shenzhen, Haoyu Wang Huazhong University of Science and Technology | ||
17:15 15mDemonstration | GoPV: A Static Analyzer for Finding Blocking Concurrency Bugs Due to Misuse of Shared-Memory Synchronization in Go Tool Demonstrations Xiaofan Xu Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University |
16:00 - 17:15 | |||
16:00 25mTalk | QTRAN: Extending Metamorphic-Oracle based Logical Bug Detection Techniques for Multiple-DBMS Dialect Support Research Papers Li Lin Xiamen University, Qinglin Zhu School of Informatics, Xiamen University, Hongqiao Chen School of Informatics, Xiamen University, Zhuangda Wang Xiamen University, Rongxin Wu Xiamen University, Xiaoheng Xie Ant Group | ||
16:25 25mTalk | Detecting Isolation Anomalies in Relational DBMSs Research Papers Rui Yang Institute of Software, Chinese Academy of Sciences, Ziyu Cui Institute of Software at Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiansen Song Institute of Software at Chinese Academy of Sciences, Xudong Xie Institute of Software Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
16:50 25mTalk | Understanding Practitioners’ Expectations on Clear Code Review Comments Research Papers Junkai Chen Zhejiang University, Zhenhao Li York University, Qiheng Mao Zhejiang University, Xing Hu Zhejiang University, Kui Liu Huawei, Xin Xia Zhejiang University |
16:00 - 17:30 | |||
16:00 25mTalk | Model Checking Guided Incremental Testing for Distributed Systems Research Papers Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dong Wang Institute of software, Chinese academy of sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Wenhan Feng Institute of Software, Chinese Academy of Sciences, Yu Liang Institute of Software Chinese Academy of Sciences, Yuan Feng Wuhan Dameng Database Co., Ltd, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
16:25 25mTalk | Identifying Multi-Parameter Constraint Errors in Python Data Science Library API Documentations Research Papers Xiufeng Xu Nanyang Technological University, Fuman Xie University of Queensland, Chenguang Zhu Meta AI, Guangdong Bai University of Queensland, Sarfraz Khurshid University of Texas at Austin, Yi Li Nanyang Technological University Pre-print | ||
16:50 25mTalk | Freesia: Verifying Correctness of TEE Communication with Concurrent Separation Logic Research Papers Fanlang Zeng Zhejiang University, Rui Chang Zhejiang University, Hongjian Liu Zhejiang University, Hangzhou, China | ||
17:15 15mDemonstration | TBFV4J: An Automated Testing-Based Formal Verification Tool for Java Tool Demonstrations |
16:00 - 17:15 | |||
16:00 25mTalk | xFUZZ: A Flexible Framework for Fine-Grained, Runtime-Adaptive Fuzzing Strategy Composition Research Papers DongSong Yu Zhongguancun Laboratory, Yiyi Wang Tsinghua University, Huazhong University of Science and Technology, Chao Zhang Tsinghua University, Yang Lan , Zhiyuan Jiang National University of Defense Technology, Shuitao Gan Labortory for Advanced Computing and Intelligence Engineering, Zheyu Ma Tsinghua University, Wende Tan Tsinghua University | ||
16:25 25mTalk | KRAKEN: Program-Adaptive Parallel Fuzzing Research Papers Anshunkang Zhou Hong Kong University of Science and Technology, Heqing Huang City University of Hong Kong, Charles Zhang Hong Kong University of Science and Technology Pre-print | ||
16:50 25mTalk | Quantum Concolic Testing Research Papers Shangzhou Xia Kyushu University, Jianjun Zhao Kyushu University, Fuyuan Zhang Kyushu University, Xiaoyu Guo Kyushu University |
Thu 26 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
11:00 - 12:15 | |||
11:00 25mTalk | Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Research Papers Niklas Risse Max-Planck-Institute for Security and Privacy, Jing Liu Max Planck Institute for Security and Privacy, Marcel Böhme MPI for Security and Privacy DOI Pre-print | ||
11:25 25mTalk | SoK: A Taxonomic Analysis of DeFi Rug Pulls - Types, Dataset, and Tool Assessment Research Papers Dianxiang Sun Nanyang Technological University, Wei Ma , Liming Nie , Yang Liu Nanyang Technological University | ||
11:50 25mTalk | Recurring Vulnerability Detection: How Far Are We? Research Papers Yiheng Cao Fudan University, Susheng Wu Fudan University, Ruisi Wang Fudan University, Bihuan Chen Fudan University, Yiheng Huang Fudan University, Chenhao Lu Fudan University, Zhuotong Zhou Fudan University, Xin Peng Fudan University |
11:00 - 12:15 | |||
11:00 25mTalk | LLM4SZZ: Enhancing SZZ Algorithm with Context-Enhanced Assessment on Large Language Models Research Papers Lingxiao Tang Zhejiang University, Jiakun Liu Singapore Management University, Zhongxin Liu Zhejiang University, Xiaohu Yang Zhejiang University, Lingfeng Bao Zhejiang University | ||
11:25 25mTalk | Walls Have Ears: Demystifying Notification Listener Usage in Android Apps Research Papers Jiapeng Deng Huazhong University of Science and Technology, Tianming Liu Monash Univerisity, Yanjie Zhao Huazhong University of Science and Technology, Chao Wang University of Science and Technology of China, Lin Zhang The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC), Haoyu Wang Huazhong University of Science and Technology | ||
11:50 25mTalk | An Investigation on Numerical Bugs in GPU Programs Towards Automated Bug Detection Research Papers Ravishka Shemal Rathnasuriya The University of Texas - Dallas, Nidhi Majoju University of Texas at Dallas, Zihe Song University of Texas at Dallas, Wei Yang UT Dallas |
11:00 - 12:30 | Test Automation, Evolution, and API TestingResearch Papers / Tool Demonstrations at Cosmos 3C Chair(s): Alexi Turcotte CISPA | ||
11:00 25mTalk | You Name It, I Run It: An LLM Agent to Execute Tests of Arbitrary Projects Research Papers | ||
11:25 25mTalk | Effective REST APIs Testing with Error Message Analysis Research Papers Lixin Xu Nanjing University, China, Huayao Wu Nanjing University, Zhenyu Pan , Tongtong Xu Huawei, Shaohua Wang Central University of Finance and Economics, Xintao Niu Nanjing University, Changhai Nie Nanjing University | ||
11:50 25mTalk | REACCEPT: Automated Co-evolution of Production and Test Code Based on Dynamic Validation and Large Language Models Research Papers Jianlei Chi , Xiaotian Wang Harbin Engineering University, Yuhan Huang Xidian University, Lechen Yu Microsoft, Di Cui Xidian University, Jianguo Sun Xidian University, Jun Sun Singapore Management University | ||
12:15 15mDemonstration | PatchScope – A Modular Tool for Annotating and Analyzing Contributions Tool Demonstrations Jakub Narębski Nicolaus Copernicus University in Toruń, Mikołaj Fejzer Nicolaus Copernicus University in Toruń, Krzysztof Stencel University of Warsaw, Piotr Przymus Nicolaus Copernicus University in Toruń, Poland |
11:00 - 12:15 | |||
11:00 25mTalk | Enhanced Prompting Framework for Code Summarization with Large Language Models Research Papers fangminying Qingdao University of Science and Technology, Xing Yuan Qingdao University of Science and Technology, Yuying Li Qingdao University of Science and Technology, Haojie Li Qingdao University of Science and Technology, Chunrong Fang Nanjing University, Junwei Du Qingdao University of Science and Technology | ||
11:25 25mTalk | CrossProbe: LLM-empowered Cross-Project Bug Detection for Deep Learning Frameworks Research Papers Hao Guan University of Queensland, Southern University of Science and Technology, Guangdong Bai University of Queensland, Yepang Liu Southern University of Science and Technology | ||
11:50 25mTalk | Safe4U: Identifying Unsound Safe Encapsulations of Unsafe Calls in Rust using LLMs Research Papers |
14:00 - 15:15 | |||
14:00 25mTalk | Assessing Scene Generation Techniques for Testing COLREGS-Compliance of Autonomous Surface Vehicles Research Papers Dominik Frey Linköping University, Ulf Kargén Linköping University, Daniel Varro Linköping University / McGill University | ||
14:25 25mTalk | Reinforcement Learning-based Fuzz Testing for the Gazebo Robotic Simulator Research Papers Zhilei Ren Dalian University of Technology, Yitao Li Dalian University of Technology, Xiaochen Li Dalian University of Technology, Guanxiao Qi Dalian University of Technology, Jifeng Xuan Wuhan University, He Jiang Dalian University of Technology | ||
14:50 25mTalk | Extended Reality Cybersickness Assessment via User Review Analysis Research Papers Shuqing Li The Chinese University of Hong Kong, Qisheng Zheng Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, jiafeng Harbin Institute of Technology, Michael Lyu Chinese University of Hong Kong |
14:00 - 15:15 | Program Analysis 1Research Papers at Cosmos 3B Chair(s): Martin Kellogg New Jersey Institute of Technology | ||
14:00 25mTalk | Bridge the Islands: Pointer Analysis for Microservice Systems Research Papers Teng Zhang Nanjing University, Yufei Liang Nanjing University, Ganlin Li Nanjing University, Tian Tan Nanjing University, Chang Xu Nanjing University, Yue Li Nanjing University | ||
14:25 25mTalk | Program Analysis Combining Generalized Bit-Level and Word-Level Abstractions Research Papers Guangsheng Fan National University of Defense Technology, Liqian Chen National University of Defense Technology, Banghu Yin College of Computer, National University of Defense Technology, Changsha, China, Wenyu Zhang National University of Defense Technology, Peisen Yao Zhejiang University, Ji Wang National University of Defense Technology | ||
14:50 25mTalk | Type-Alias Analysis: Enabling LLVM IR with Accurate Types Research Papers Jinmeng Zhou Zhejiang University, Ziyue Pan Zhejiang University, Wenbo Shen Zhejiang University, Xingkai Wang Zhejiang University, Kangjie Lu University of Minnesota, Zhiyun Qian University of California at Riverside, USA |
14:00 - 15:15 | |||
14:00 25mTalk | Are Autonomous Web Agents good testers? Research Papers Antoine Chevrot Smartesting, Alexandre Vernotte Smartesting, Jean-Rémy Falleri Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, Institut Universitaire de France, Xavier Blanc Université de Bordeaux, Bruno Legeard Université de Bourgogne Franche-Comté and Smartesting, Aymeric Cretin Smartesting | ||
14:25 25mTalk | MLLM-Based UI2Code Automation Guided by UI Layout Information Research Papers Fan Wu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Shuqing Li The Chinese University of Hong Kong, Xin-Cheng Wen Harbin Institute of Technology, Qing Liao Harbin Institute of Technology DOI Pre-print | ||
14:50 25mTalk | GUIPilot: A Consistency-based Mobile GUI Testing Approach for Detecting Application-specific Bugs Research Papers Ruofan Liu Shanghai Jiao Tong University; National University of Singapore, Xiwen Teoh National University of Singapore, Yun Lin Shanghai Jiao Tong University, Guanjie Chen Shanghai Jiao Tong University, Ruofei Ren Shanghai Jiao Tong University, Denys Poshyvanyk William & Mary, Jin Song Dong National University of Singapore Link to publication File Attached |
14:00 - 15:30 | Code and Documentation GenerationResearch Papers / Tool Demonstrations at Cosmos Hall Chair(s): Ying Zou Queen's University, Kingston, Ontario | ||
14:00 25mTalk | The First Prompt Counts the Most! An Evaluation of Large Language Models on Iterative Example-based Code Generation Research Papers Yingjie Fu Peking University, Bozhou Li Peking University, Linyi Li Simon Fraser University, Wentao Zhang Peking University, Tao Xie Peking University | ||
14:25 25mTalk | VerLog: Enhancing Release Note Generation for Android Apps using Large Language Models Research Papers Jiawei Guo University at Buffalo, SUNY, Haoran Yang Washington State University, Haipeng Cai University at Buffalo, SUNY | ||
14:50 25mTalk | Can LLMs replace Human Evaluators? An Empirical Study of LLM-as-a-Judge in Software Engineering Tasks Research Papers Ruiqi Wang Harbin Institute of Technology, Shenzhen, Jiyu Guo Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Guodong Fan Shandong Agriculture and Engineering University, Chun Yong Chong Huawei, Xin Xia Zhejiang University DOI Pre-print | ||
15:15 15mDemonstration | Code2API: A Tool for Generating Reusable APIs from Stack Overflow Code Snippets Tool Demonstrations Yubo Mai Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Xing Hu Zhejiang University, Lingfeng Bao Zhejiang University, Jingyuan Chen , JianLing Sun Zhejiang University |
16:00 - 17:15 | |||
16:00 25mTalk | Program Feature-based Benchmarking for Fuzz Testing Research Papers Miao Miao The University of Texas at Dallas, Sriteja Kummita Fraunhofer Institute for Mechatronic Systems Design (Fraunhofer IEM), Eric Bodden Heinz Nixdorf Institute at Paderborn University; Fraunhofer IEM, Shiyi Wei University of Texas at Dallas | ||
16:25 25mTalk | Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-based RAG Research Papers Zhiyu Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Longxing Li Institute of Information Engineering, Chinese Academy of Sciences, China, Ruigang Liang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
16:50 25mTalk | Structure-Aware, Diagnosis-Guided ECU Firmware Fuzzing Research Papers Qicai Chen Fudan University, China, Kun Hu School of Computer Science, Fudan University, Sichen Gong Fudan University, China, Bihuan Chen Fudan University, kevin kong Fudan University, Haowen Jiang Fudan University, China, Bingkun Sun Fudan University, You Lu Fudan University, Xin Peng Fudan University |
16:00 - 17:15 | |||
16:00 25mTalk | DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code Research Papers WONG Wai Kin Hong Kong University of Science and Technology, Daoyuan Wu Hong Kong University of Science and Technology, Huaijin Wang Ohio State University, Li Zongjie Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen Lab | ||
16:25 25mTalk | DataHook: An Efficient and Lightweight System Call Hooking Technique without Instruction Modification Research Papers Quan Hong Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, Jiaqi Li Institute of Information Engineering, Chinese Academy of Sciences, Wen Zhang China Unicom Online Information Technology CO.,Ltd, Lidong Zhai Institute of Information Engineering, Chinese Academy of Sciences | ||
16:50 25mTalk | Tracezip: Efficient Distributed Tracing via Trace Compression Research Papers Zhuangbin Chen Sun Yat-sen University, Junsong Pu Beijing University of Posts and Telecommunication, Zibin Zheng Sun Yat-sen University |
16:00 - 17:15 | Code Generation with LLMsResearch Papers at Cosmos 3C Chair(s): Yutian Tang University of Glasgow, United Kingdom | ||
16:00 25mTalk | LLM Hallucinations in Practical Code Generation: Phenomena, Mechanism, and Mitigation Research Papers Ziyao Zhang Sun Yat-sen University, Chong Wang Nanyang Technological University, Yanlin Wang Sun Yat-sen University, Ensheng Shi Xi’an Jiaotong University, Yuchi Ma Huawei Cloud Computing Technologies, Wanjun Zhong Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Mingzhi Mao Sun Yat-sen University, Zibin Zheng Sun Yat-sen University | ||
16:25 25mTalk | ConTested: Consistency-Aided Tested Code Generation with LLM Research Papers Jinhao Dong Peking University, Jun Sun Singapore Management University, Wenjie Zhang National University of Singapore, Jin Song Dong National University of Singapore, Dan Hao Peking University Pre-print | ||
16:50 25mTalk | Causality-Aided Evaluation and Explanation of Large Language Model-based Code Generation Research Papers Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Li Zongjie Hong Kong University of Science and Technology, Zhaoyu Wang HKUST, Shuai Wang Hong Kong University of Science and Technology |
Fri 27 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
11:00 - 12:15 | |||
11:00 25mTalk | Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Research Papers Lei Yu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Zhirong Huang Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Hang Yuan Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Shiqi Cheng Institute of Software, Chinese Academy of Sciences, China, Li Yang Institute of Software, Chinese Academy of Sciences, Fengjun Zhang Institute of Software, Chinese Academy of Sciences, China, Chenjie Shen Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Jiajia Ma Institute of Software, Chinese Academy of Sciences, China, Jingyuan Zhang Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Junyi Lu Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China, Chun Zuo Sinosoft | ||
11:25 25mTalk | Enhancing Smart Contract Security Analysis with Execution Property Graphs Research Papers Kaihua Qin Yale University, Zhe Ye UC Berkeley, Zhun Wang UC Berkeley, Weilin Li University College London, Liyi Zhou The University of Sydney, Chao Zhang Tsinghua University, Dawn Song UC Berkeley, Arthur Gervais Imperial College London | ||
11:50 25mTalk | The Incredible Shrinking Context... in a decompiler near you Research Papers Sifis Lagouvardos University of Athens, Yannis Bollanos Dedaub, Neville Grech Dedaub Limited, Yannis Smaragdakis University of Athens Pre-print |
11:00 - 12:15 | |||
11:00 25mTalk | Bridging the Gaps Between Graph Neural Networks and Data-Flow Analysis: The Closer, the Better Research Papers Qingchen Yu Zhejiang University, Xin Liu Lanzhou University, Qingguo Zhou Lanzhou University, Chunming Wu Zhejiang University | ||
11:25 25mTalk | Clause2Inv: A Generate-Combine-Check Framework for Loop Invariant Inference Research Papers Weining Cao Nanjing University, China, Guangyuan Wu Nanjing University, China, Tangzhi Xu Nanjing University, China, Yuan Yao Nanjing University, Hengfeng Wei State Key Laboratory for Novel Software Technology, Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma Nanjing University | ||
11:50 25mTalk | Incremental Verification of Concurrent Programs through Refinement Constraint Adaptation Research Papers Liangze Yin National University of Defense Technology, Yiwei Li , Kun Chen National University of Defense Technology, Wei Dong National University of Defense Technology, Ji Wang National University of Defense Technology |
11:00 - 12:15 | |||
11:00 25mTalk | KEENHash: Hashing Programs into Function-aware Embeddings for Large-scale Binary Code Similarity Analysis Research Papers Zhijie Liu ShanghaiTech University, China, Qiyi Tang Tencent Security Keen Lab, Sen Nie Tencent Security Keen Lab, Shi Wu Tencent Security Keen Lab, Liangfeng Zhang School of Information Science and Technology, ShanghaiTech University, Yutian Tang University of Glasgow, United Kingdom | ||
11:25 25mTalk | Porting Software Libraries to OpenHarmony: Transitioning from TypeScript or JavaScript to ArkTS Research Papers | ||
11:50 25mTalk | STRUT: Structured Seed Case Guided Unit Test Generation for C Programs using LLMs Research Papers Jinwei Liu Xidian University, Chao Li Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Rui Chen Beijing Institute of Control Engineering; Beijing Sunwise Information Technology, Shaofeng Li Xidian University, Bin Gu Beijing Institute of Control Engineering, Mengfei Yang China Academy of Space Technology |
11:00 - 12:05 | Empirical StudiesTool Demonstrations / Research Papers at Cosmos Hall Chair(s): Miryung Kim UCLA and Amazon Web Services | ||
11:00 25mTalk | Fixing Outside the Box: Uncovering Tactics for Open-Source Security Issue Management Research Papers Lyuye Zhang Nanyang Technological University, Wu Jiahui , Chengwei Liu Nanyang Technological University, Kaixuan Li East China Normal University; Nanyang Technological University, Xiaoyu Sun Australian National University, Australia, Lida Zhao Nanyang Technological University, Chong Wang Nanyang Technological University, Yang Liu Nanyang Technological University | ||
11:25 25mTalk | More Effective JavaScript Breaking Change Detection via Dynamic Object Relation Graph Research Papers Dezhen Kong Zhejiang University, Jiakun Liu Singapore Management University, Chao Ni Zhejiang University, David Lo Singapore Management University, Lingfeng Bao Zhejiang University | ||
11:50 15mDemonstration | LiPSBOMaker: A Prototype of Multi-Stage Linux Distribution Package SBOM Generator Tool Demonstrations Tong Qiu , Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences |
14:00 - 15:30 | AI TestingResearch Papers / Tool Demonstrations at Cosmos 3A Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
14:00 25mTalk | AudioTest: Prioritizing Audio Test Cases Research Papers Yinghua Li University of Luxembourg, Xueqi Dang University of Luxembourg, SnT, Wendkuuni Arzouma Marc Christian OUEDRAOGO University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg | ||
14:25 25mTalk | S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models Research Papers Xiaohan Yuan Zhejiang University, Jinfeng Li Alibaba Group, Dongxia Wang Zhejiang University, Yuefeng Chen Alibaba Group, Xiaofeng Mao Alibaba Group, Longtao Huang Alibaba Group, Jialuo Chen Zhejiang University, Hui Xue Alibaba Group, Xiaoxia Liu Zhejiang University, Wenhai Wang Zhejiang University, Kui Ren Zhejiang University, Jingyi Wang Zhejiang University | ||
14:50 25mTalk | Improving Deep Learning Framework Testing with Model-Level Metamorphic Testing Research Papers Yanzhou Mu , Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Xiang Chen Nantong University, Zhixiang Cao Xi'an Jiaotong University, Peiran Yang Nanjing University, Kexin Zhao Nanjing University, An Guo Nanjing University, Zhenyu Chen Nanjing University | ||
15:15 15mDemonstration | ASTRAL: A Tool for the Automated Safety Testing of Large Language Models Tool Demonstrations Miriam Ugarte Mondragon University, Pablo Valle Mondragon University, José Antonio Parejo Maestre Universidad de Sevilla, Sergio Segura SCORE Lab, I3US Institute, Universidad de Sevilla, Seville, Spain, Aitor Arrieta Mondragon University |
14:00 - 15:30 | Binary Code Analysis and OptimizationResearch Papers / Tool Demonstrations at Cosmos 3B Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
14:00 25mTalk | BinQuery: A Novel Framework for Natural Language-Based Binary Code Retrieval Research Papers Bolun Zhang Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China, Zeyu Gao Tsinghua University, Hao Wang Tsinghua University, Yuxin Cui Institute for Network Sciences and Cyberspace, Tsinghua University, Siliang Qin Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China, Chao Zhang Tsinghua University, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Beibei Zhao Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences, China | ||
14:25 25mTalk | Wemby’s Web: Hunting for Memory Corruption in WebAssembly Research Papers Oussama Draissi University of Duisburg-Essen, Tobias Cloosters University of Duisburg-Essen, David Klein TU Braunschweig, Michael Rodler Amazon Web Services, Marius Musch TU Braunschweig, Martin Johns TU Braunschweig, Lucas Davi University of Duisburg-Essen | ||
14:50 25mTalk | Doctor: Optimizing Container Rebuild Efficiency by Instruction Re-Orchestration Research Papers Zhiling Zhu Zhejiang University of Technology, Tieming Chen Zhejiang University of Technology, Chengwei Liu Nanyang Technological University, Han Liu The Hong Kong University of Science and Technology, Qijie Song Zhejiang University of Technology, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Yang Liu Nanyang Technological University | ||
15:15 15mDemonstration | ReGraph: A Tool for Binary Similarity Identification Tool Demonstrations |
14:00 - 15:30 | Gamification, Specifications, and Code ReviewsResearch Papers / Tool Demonstrations at Cosmos 3C Chair(s): Michael Pradel University of Stuttgart | ||
14:00 25mTalk | NADA: Neural Acceptance-driven Approximate Specification Mining Research Papers Weilin Luo Sun Yat-sen University, Tingchen Han Sun Yat-Sen University, Junming Qiu Sun Yat-sen University, Hai Wan Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Bo Peng Sun Yat-Sen University, Guohui Xiao Southeast University, Yanan Liu SUN YAT-SEN UNIVERSITY | ||
14:25 25mTalk | Gamifying Testing in IntelliJ: A Replicability Study Research Papers Philipp Straubinger University of Passau, Tommaso Fulcini Politecnico di Torino, Giacomo Garaccione Politecnico di Torino, Luca Ardito Politecnico di Torino, Gordon Fraser University of Passau | ||
14:50 25mTalk | DeCoMa: Detecting and Purifying Code Dataset Watermarks through Dual Channel Code Abstraction Research Papers Yuan Xiao Nanjing University, Yuchen Chen Nanjing University, Shiqing Ma University of Massachusetts at Amherst, Haocheng Huang Soochow University, Chunrong Fang Nanjing University, Yanwei Chen Nanjing University, Weisong Sun Nanyang Technological University, Yunfeng Zhu Nanjing University, Xiaofang Zhang Soochow University, Zhenyu Chen Nanjing University Pre-print | ||
15:15 15mDemonstration | Teaching Software Testing and Debugging with the Serious Game Sojourner under Sabotage Tool Demonstrations Philipp Straubinger University of Passau, Tim Greller University of Passau, Gordon Fraser University of Passau |
16:00 - 17:15 | |||
16:00 25mTalk | OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum Virtual Machine Research Papers Jie Ma Beihang University; Zhongguancun Laboratory, Ningyu He Hong Kong Polytechnic University, Jinwen Xi , Mingzhe Xing Zhongguancun Laboratory, Haoyu Wang Huazhong University of Science and Technology, Ying Gao School of Cyber Science and Technology, Beihang University; Zhongguancun Laboratory, Yinliang Yue Zhongguancun Laboratory | ||
16:25 25mTalk | Why Does My Transaction Fail? A First Look at Failed Transactions on the Solana Blockchain Research Papers Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, David Lo Singapore Management University, Difan Xie Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Xiaohu Yang Zhejiang University | ||
16:50 25mTalk | Automated Attack Synthesis for Constant Product Market Makers Research Papers Pre-print |
16:00 - 17:30 | Fuzzing and Search-Based TestingResearch Papers / Tool Demonstrations at Cosmos 3C Chair(s): Thuan Pham University of Melbourne | ||
16:00 25mTalk | ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference Research Papers Yuchong Xie Hong Kong University of Science and Technology, Wenhui Zhang Hunan University, Changsha, China, Dongdong She HKUST (The Hong Kong University of Science and Technology) | ||
16:25 25mTalk | WildSync: Automated Fuzzing Harness Synthesis via Wild API Usage Recovery Research Papers | ||
16:50 25mTalk | FANDANGO: Evolving Language-Based Testing Research Papers José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, Marius Smytzek CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security | ||
17:15 15mDemonstration | XAVIER: Grammar-Based Testing for XML Injection Attacks Tool Demonstrations Paul Kalbitzer , José Antonio Zamudio Amaya CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security |
Unscheduled Events
Not scheduled Talk | Robust Vulnerability Detection Across Compilations: LLVM-IR vs. Assembly with Transformer Model Research Papers Rony Shir Ben Gurion University of the Negev, Priyanka Surve Ben Gurion University of the Negev, Yuval Elovici Ben Gurion University of the Negev, Asaf Shabtai Ben Gurion University of the Negev | ||
Not scheduled Talk | ALMOND: Learning an Assembly Language Model for 0-Shot Code Obfuscation Detection Research Papers Xuezixiang Li UC Riverside, Sheng Yu Deepbits Technology Inc., Heng Yin University of California at Riverside | ||
Not scheduled Talk | Enhancing Vulnerability Detection via Inter-procedural Semantic Completion Research Papers bozhi wu Singapore Management University, Chengjie Liu Peking University, Zhiming Li Nanyang Technological University, Singapore, Yushi Cao Nanyang Technological University, Jun Sun Singapore Management University, Shang-Wei LIN Singapore Institute of Technology | ||
Not scheduled Talk | Copy-and-Paste? Identifying EVM-Inequivalent Code Smells in Multi-chain Reuse Contracts Research Papers Zexu Wang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Tao Zhang Macau University of Science and Technology, Yu Zhang Harbin Institute of Technology, Weizhe Zhang Harbin Institute of Technology, Yuming Feng Peng Cheng Laboratory, Zibin Zheng Sun Yat-sen University | ||
Not scheduled Talk | FreeWavm: Enhanced WebAssembly Runtime Fuzzing Guided by Parse Tree Mutation and Snapshot Research Papers Peng Qian Zhejiang University, Xinlei Ying Ant Group, Jiashui Wang Zhejiang University, Long Liu Ant Group, Lun Zhang GoPlus Security, Jianhai Chen Zhejiang University, Qinming He Zhejiang University | ||
Not scheduled Talk | Dynamically Fusing Python HPC Kernels Research Papers Nader Al Awar The University of Texas at Austin, Muhammad Hannan Naeem The University of Texas at Austin, James Almgren-Bell The University of Texas at Austin, George Biros The University of Texas at Austin, Milos Gligoric The University of Texas at Austin | ||
Not scheduled Talk | Uncovering API-Scope Misalignment in the App-in-App Ecosystem Research Papers Jiarui Che College of Computer Science, Nankai University, Chenkai Guo Nankai University, China, Naipeng Dong The University of Queensland, Australia, Jiaqi Pei College of Cyber Science, Nankai University, Lingling Fan Nankai University, Xun Mi College of Cyber Science, Nankai University, Xueshuo Xie College of Computer Science, Nankai University, Xiangyang Luo State Key Laboratory of Mathematical Engineering and Advanced Computing, Zheli Liu Nankai University, Renhong Cheng College of Computer Science, Nankai University | ||
Not scheduled Talk | Finding 709 Defects in 258 Projects: An Experience Report on Applying CodeQL to Open-Source Embedded Software (Experience Paper) Research Papers Mingjie Shen Purdue University, Akul Abhilash Pillai Purdue University, Brian A. Yuan Purdue University, James C. Davis Purdue University, Aravind Machiry Purdue University | ||
Not scheduled Talk | A Low-Cost Feature Interaction Fault Localization Approach for Software Product Lines Research Papers Haining Wang South China University of Technology, Yi Xiang South China University of Technology, Han Huang South China University of Technology, Jie Cao , Kaichen Chen South China University of Technology, Xiaowei Yang South China University of Technology | ||
Not scheduled Talk | Automated Test Transfer Across Android Apps Using Large Language Models Research Papers Benyamin Beyzaei UC Irvine, Saghar Talebipour University of Southern California, Ghazal Rafiei University of Southern California, Nenad Medvidović University of Southern California, Sam Malek University of California at Irvine | ||
Not scheduled Talk | BinDSA: Efficient, Precise Binary-Level Pointer Analysis with Context-Sensitive Heap Reconstruction Research Papers | ||
Not scheduled Talk | DepState: Detecting Synchronization Failure Bugs in Distributed Database Management Systems Research Papers Cundi Fang National University of Defense Technology, Jie Liang , Zhiyong Wu Tsinghua University, China, Jingzhou Fu School of Software, Tsinghua University, Zhouyang Jia National University of Defense Technology, Chun Huang National University of Defense Technology, Yu Jiang Tsinghua University, Shanshan Li National University of Defense Technology |
Accepted Papers
Call for Papers
We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental research on software testing and analysis.
ISSTA invites three kinds of submissions. The majority of submissions are expected to be “Research Papers”, but submissions that best fit the description of “Experience Papers” or “Replicability Studies” should be submitted as such. A good Experience Paper will include lessons learned or other wisdom synthesised for the community from the reported experience. Replicability Studies shall clearly describe their purpose and value beyond the original result.
NEW THIS YEAR: The conference proceedings will be published in the Proceedings of the ACM on Software Engineering (PACMSE), Issue: ISSTA 2025.
Research Papers
Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.
Experience Papers
Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience.
Replicability Studies
ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artefacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artefact only, but instead to perform a comparative experiment of multiple related approaches.
Replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): the measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artefacts which they develop completely independently. Moreover, it is generally also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:
- Depth and breadth of experiments
- Clarity of writing
- Appropriateness of conclusions
- Amount of useful, actionable insights
- Availability of artefacts
We expect replicability studies to clearly point out the artefacts the study is built on, and to submit those artefacts to the artefact evaluation. Artefacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.
Major Revisions
Papers submitted to the initial deadline may be accepted, rejected or may receive a chance to submit a major revision of the initial submission to the major revision deadline.
Submission Guidelines
Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for ISSTA. Authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.
At the time of submission, each paper should have no more than 18 pages for all text and figures, plus 4 pages for references, using the following templates: Latex or Word (Mac) or Word (Windows). Authors using LaTeX should use the sample-acmsmall-conf.tex file (found in the samples folder of the acmart package) with the acmsmall option. We also strongly encourage the use of the review, screen, and anonymous options as well. In sum, you want to use:
\documentclass[acmsmall,screen,review,anonymous]{acmart}
Papers may use either numeric or author-year format for citations. It is a single-column page layout. Submissions that do not comply with the above instructions will be desk rejected without review.
The page limit is strict, i.e., papers that take more than 18 pages for anything apart from references (including any section, figure, text, or appendix), will be desk-rejected. Experience papers and replicability studies should clearly specify their category in the paper title upon submission: “[TITLE](Experience Paper)”, “[TITLE](Replicability Study)”. Papers must be submitted electronically through the ISSTA 2025 submission site.
Each submission will be reviewed by at least three members of the program committee. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation, appropriate comparison to related work, and verifiability/transparency of the work. Some papers may have more than three reviews, as the PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.
Double-anonymous Reviewing
ISSTA 2025 will conduct double-anonymous reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission and may want to confirm that their generated PDF does not contain any meta-data with their names. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.
Open Science Policy and “Data Availability” Section
ISSTA has adopted an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.
Upon submission, authors are asked to make their code, data, etc. available to the program committee (via upload of anonymized supplemental material or a link to an anonymized private or public repository) or to comment on why this is not possible or desirable. At least one of the reviewers will check the provided data. While sharing the data is not mandatory for submission or acceptance, it will inform the program committee’s decision. Furthermore, we ask authors to provide a supporting statement on the data availability (or lack thereof) in their submitted papers in a section named “Data Availability” after the Conclusion section.
Important Dates
All dates are 23:59:59 AoE (UTC-12h):
- Full paper submission: 31 October, 2024
- Initial notification: 19 December, 2024
- Revised manuscript submissions (major revisions only): 27 February, 2025
- Final notification for major revisions: 31 March, 2025
- Camera ready: 24 April, 2025
Publication Date
The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of the ISSTA conference. The official publication date affects the deadline for any patent filings related to published work.