ISSTA 2024
Mon 16 - Fri 20 September 2024 Vienna, Austria
co-located with ISSTA/ECOOP 2024

The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.

ISSTA 2024 will feature two submission deadlines. You can choose to submit at either deadline, but papers submitted to the first deadline may receive a chance to submit a major revision of the initial submission to the second deadline. Papers submitted to the second deadline will be either accepted or rejected, i.e., there is no option for a major revision.

Dates
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 18 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

08:00 - 08:30
08:30 - 09:00
Opening and AwardsKeynotes at EI 7
Chair(s): Maria Christakis TU Wien, Michael Pradel University of Stuttgart
10:00 - 10:30
10:30 - 11:50
Code Mutation and ReductionTechnical Papers at EI 10 Fritz Paschke
Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security
10:30
20m
Talk
Large Language Models for Equivalent Mutant Detection: How Far Are We?ACM SIGSOFT Distinguished Paper Award
Technical Papers
Zhao Tian Tianjin University, Honglin Shu Kyushu University, Dong Wang Tianjin University, Xuejie Cao Tianjin University, Yasutaka Kamei Kyushu University, Junjie Chen Tianjin University
DOI Pre-print
10:50
20m
Talk
An Empirical Examination of Fuzzer Mutator Performance
Technical Papers
James Kukucka George Mason University, Luís Pina University of Illinois at Chicago, Paul Ammann George Mason University, Jonathan Bell Northeastern University
DOI
11:10
20m
Talk
Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java Programs
Technical Papers
Benjamin Kushigian University of Washington, Samuel Kaufman University of Washington, Ryan Featherman University of Washington, Hannah Potter University of Washington, Ardi Madadi University of Washington, René Just University of Washington
DOI
11:30
20m
Talk
LPR: Large Language Models-Aided Program Reduction
Technical Papers
Mengxiao Zhang University of Waterloo, Yongqiang Tian Hong Kong University of Science and Technology, Zhenyang Xu University of Waterloo, Yiwen Dong University of Waterloo, Shin Hwei Tan Concordia University, Chengnian Sun University of Waterloo
DOI
10:30 - 11:50
UI-Level TestingTechnical Papers at EI 3 Sahulka
Chair(s): Chunyang Chen TU Munich
10:30
20m
Talk
Toward the Automated Localization of Buggy Mobile App UIs from Bug Descriptions
Technical Papers
Antu Saha William & Mary, Yang Song William & Mary, Junayed Mahmud University of Central Florida, Ying Zhou George Mason University, Kevin Moran University of Central Florida, Oscar Chaparro William & Mary
DOI
10:50
20m
Talk
Reproducing Timing-Dependent GUI Flaky Tests in Android Apps via a Single Event Delay
Technical Papers
Xiaobao Cai Fudan University, Zhen Dong Fudan University, Yongjiang Wang Fudan University, Abhishek Tiwari University of Passau, Xin Peng Fudan University
DOI
11:10
20m
Talk
Semantic Constraint Inference for Web Form Test Generation
Technical Papers
Parsa Alian University of British Columbia, Noor Nashid University of British Columbia, Mobina Shahbandeh University of British Columbia, Ali Mesbah University of British Columbia
DOI
11:30
20m
Talk
Guardian: A Runtime Framework for LLM-Based UI Exploration
Technical Papers
Dezhi Ran Peking University, Hao Wang Peking University, Zihe Song University of Texas at Dallas, Mengzhou Wu Peking University, Yuan Cao Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Tao Xie Peking University
DOI
10:30 - 11:50
LLMs for Code GenerationTechnical Papers at EI 7
Chair(s): Chao Peng ByteDance
10:30
20m
Talk
AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code GenerationACM SIGSOFT Distinguished Paper Award
Technical Papers
Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Zhou Yang Singapore Management University, Li Li Beihang University, David Lo Singapore Management University
DOI Pre-print
10:50
20m
Talk
When to Stop? Towards Efficient Code Generation in LLMs with Excess Token PreventionACM SIGSOFT Distinguished Paper Award
Technical Papers
Lianghong Guo Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Ensheng Shi Xi’an Jiaotong University, Wanjun Zhong Sun Yat-sen University, Hongyu Zhang Chongqing University, Jiachi Chen Sun Yat-sen University, Ruikai Zhang Huawei Cloud Computing Technologies, Yuchi Ma Huawei Cloud Computing Technologies, Zibin Zheng Sun Yat-sen University
DOI
11:10
20m
Talk
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion
Technical Papers
Qi Guo Tianjin University, Xiaohong Li Tianjin University, Xiaofei Xie Singapore Management University, Shangqing Liu Nanyang Technological University, Ze Tang Nanjing University, Ruitao Feng Singapore Management University, Junjie Wang Tianjin University, Jidong Ge Nanjing University, Lei Bu Nanjing University
DOI
11:30
20m
Talk
Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks
Technical Papers
Yuxin Qiu University of California at Riverside, Jie Hu University of California at Riverside, Qian Zhang University of California at Riverside, Heng Yin University of California at Riverside
DOI
10:30 - 11:50
Fuzzing 1Technical Papers at EI 9 Hlawka
Chair(s): Shiyi Wei University of Texas at Dallas
10:30
20m
Talk
Policy Testing with MDPFuzz (Replicability Study)ACM SIGSOFT Distinguished Paper Award
Technical Papers
Quentin Mazouni Simula Research Laboratory, Helge Spieker Simula Research Laboratory, Arnaud Gotlieb Simula Research Laboratory, Mathieu Acher University of Rennes - Inria - CNRS - IRISA
DOI
10:50
20m
Talk
Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation
Technical Papers
Jueon Eom Yonsei University, Seyeon Jeong Suresofttech, Taekyoung Kwon Yonsei University
DOI
11:10
20m
Talk
Enhancing ROS System Fuzzing through Callback Tracing
Technical Papers
Yuheng Shen Tsinghua University, Jianzhong Liu Tsinghua University, Yiru Xu Tsinghua University, Hao Sun ETH Zurich, Mingzhe Wang Tsinghua University, Nan Guan City University of Hong Kong, Heyuan Shi Central South University, Yu Jiang Tsinghua University
DOI
11:30
20m
Talk
Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC
Technical Papers
Haolai Wei Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Liwei Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhijie Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Gang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
12:00 - 13:30
13:30 - 14:50
Domain-Specific TestingTechnical Papers at EI 10 Fritz Paschke
Chair(s): Marcelo d'Amorim North Carolina State University
13:30
20m
Talk
UPBEAT: Test Input Checks of Q# Quantum Libraries
Technical Papers
Tianmin Hu Northwest University, Guixin Ye Northwest University, Zhanyong Tang Northwest University, Shin Hwei Tan Concordia University, Huanting Wang University of Leeds, Meng Li Hefei University of Technology, Zheng Wang University of Leeds
DOI
13:50
20m
Talk
Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement
Technical Papers
Gwihwan Go Tsinghua University, Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Xiazijian Zou Central South University, Heyuan Shi Central South University, Yu Jiang Tsinghua University
DOI
14:10
20m
Talk
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar InferenceACM SIGSOFT Distinguished Paper Award
Technical Papers
Hyungseok Kim Affiliated Institute of ETRI, Soomin Kim KAIST, Jungwoo Lee KAIST, Sang Kil Cha KAIST
DOI
14:30
20m
Talk
Ma11y: A Mutation Framework for Web Accessibility Testing
Technical Papers
Mahan Tafreshipour University of California at Irvine, Anmol Vilas Deshpande University of California at Irvine, Forough Mehralian University of California at Irvine, Iftekhar Ahmed University of California at Irvine, Sam Malek University of California at Irvine
DOI
13:30 - 14:50
Vulnerability DetectionTechnical Papers at EI 3 Sahulka
Chair(s): Cuiyun Gao Harbin Institute of Technology
13:30
20m
Talk
Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph
Technical Papers
Xiaoyong Yan Zhejiang University, Biao He Ant Group, Wenbo Shen Zhejiang University, Yu Ouyang Ant Group, Kaihang Zhou Zhejiang University, Xingjian Zhang Zhejiang University, Xingyu Wang Zhejiang University, Yukai Cao Zhejiang University, Rui Chang Zhejiang University
DOI
13:50
20m
Talk
SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection
Technical Papers
Xin-Cheng Wen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shuzheng Gao Chinese University of Hong Kong, Yang Xiao Chinese Academy of Sciences, Michael Lyu Chinese University of Hong Kong
DOI
14:10
20m
Talk
CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection
Technical Papers
Hao Wang Tsinghua University, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Mingyang Sun University of Electronic Science and Technology of China, Yuchen Zhou Beijing University of Technology, Han Qiu Tsinghua University, Xi Xiao Tsinghua University
DOI
14:30
20m
Talk
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Technical Papers
Zhaoyang Chu Huazhong University of Science and Technology, Yao Wan Huazhong University of Science and Technology, Qian Li Curtin University, Yang Wu Huazhong University of Science and Technology, Hongyu Zhang Chongqing University, Yulei Sui UNSW, Guandong Xu University of Technology, Hai Jin Huazhong University of Science and Technology
DOI Pre-print
13:30 - 14:50
Fairness and Safety of Neural NetworksTechnical Papers at EI 7
Chair(s): Jingyi Wang Zhejiang University
13:30
20m
Talk
NeuFair: Neural Network Fairness Repair with Dropout
Technical Papers
Vishnu Asutosh Dasu Pennsylvania State University, Ashish Kumar Pennsylvania State University, Saeid Tizpaz-Niari University of Texas at El Paso, Gang (Gary) Tan Pennsylvania State University
DOI
13:50
20m
Talk
A Large-Scale Empirical Study on Improving the Fairness of Image Classification Models
Technical Papers
Junjie Yang College of Intelligence and Computing, Tianjin University, Jiajun Jiang Tianjin University, Zeyu Sun Institute of Software at Chinese Academy of Sciences, Junjie Chen Tianjin University
DOI
14:10
20m
Talk
Efficient DNN-Powered Software with Fair Sparse Models
Technical Papers
Xuanqi Gao Xi’an Jiaotong University, Weipeng Jiang Xi’an Jiaotong University, Juan Zhai University of Massachusetts at Amherst, Shiqing Ma University of Massachusetts at Amherst, Xiaoyu Zhang Xi’an Jiaotong University, Chao Shen Xi’an Jiaotong University
DOI Pre-print
14:30
20m
Talk
Synthesizing Boxes Preconditions for Deep Neural Networks
Technical Papers
Zengyu Liu National University of Defense Technology, Liqian Chen National University of Defense Technology, Wanwei Liu National University of Defense Technology, Ji Wang National University of Defense Technology
DOI
13:30 - 14:30
Test GenerationTechnical Papers at EI 9 Hlawka
Chair(s): Alessio Gambi Austrian Institute of Technology (AIT)
13:30
20m
Talk
Domain Adaptation for Code Model-Based Unit Test Case Generation
Technical Papers
Jiho Shin York University, Sepehr Hashtroudi University of Calgary, Hadi Hemmati York University, Song Wang York University
DOI
13:50
20m
Talk
Practitioners’ Expectations on Automated Test Generation
Technical Papers
Xiao Yu Huawei, Lei Liu Xi’an Jiaotong University, Xing Hu Zhejiang University, Jacky Keung City University of Hong Kong, Xin Xia Huawei, David Lo Singapore Management University
DOI
14:10
20m
Talk
UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing
Technical Papers
Yifeng He University of California at Davis, Jiabo Huang Tencent, Yuyang Rong University of California at Davis, Yiwen Guo Unaffiliated, Ethan Wang University of California at Davis, Hao Chen University of California at Davis
DOI
15:00 - 15:30
15:30 - 16:50
Empirical StudiesTechnical Papers at EI 10 Fritz Paschke
Chair(s): Cristian Cadar Imperial College London
15:30
20m
Talk
Bugs in Pods: Understanding Bugs in Container Runtime Systems
Technical Papers
Jiongchi Yu Singapore Management University, Xiaofei Xie Singapore Management University, Cen Zhang Nanyang Technological University, Sen Chen Tianjin University, Yuekang Li UNSW, Wenbo Shen Zhejiang University
DOI
15:50
20m
Talk
An Empirical Study on Kubernetes Operator Bugs
Technical Papers
Qingxin Xu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
16:10
20m
Talk
Understanding Misconfigurations in ROS: An Empirical Study and Current Approaches
Technical Papers
Paulo Canelas Carnegie Mellon University, Bradley Schmerl Carnegie Mellon University, Alcides Fonseca LASIGE; University of Lisbon, Christopher Steven Timperley Carnegie Mellon University
DOI Pre-print Media Attached
16:30
20m
Talk
An In-Depth Study of Runtime Verification Overheads during Software TestingACM SIGSOFT Distinguished Paper Award
Technical Papers
Kevin Guan Cornell University, Owolabi Legunsen Cornell University
DOI
15:30 - 17:10
Static Analysis and VerificationTechnical Papers at EI 3 Sahulka
Chair(s): Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
15:30
20m
Talk
Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace Checking
Technical Papers
Weilin Luo Sun Yat-sen University, Pingjia Liang Sun Yat-sen University, Junming Qiu Sun Yat-sen University, Polong Chen Sun Yat-sen University, Hai Wan Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Weiyuan Fang Sun Yat-sen University
DOI
15:50
20m
Talk
Interprocedural Path Complexity Analysis
Technical Papers
Mira Kaniyur Harvey Mudd College, Ana Cavalcante-Studart Harvey Mudd College, Yihan Yang Harvey Mudd College, Sangeon Park Harvey Mudd College, David Chen Harvey Mudd College, Duy Lam Harvey Mudd College, Lucas Bang Harvey Mudd College
DOI
16:10
20m
Talk
VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information Extraction
Technical Papers
Thanh-Dat Nguyen University of Melbourne, Tung Do-Viet Cinnamon AI, Hung Nguyen-Duy Independent Researcher, Tuan-Hai Luu Cinnamon AI, Hung Le Deakin University, Xuan-Bach D. Le University of Melbourne, Patanamon Thongtanunam University of Melbourne
DOI Pre-print
16:30
20m
Talk
Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks
Technical Papers
Huaien Zhang Hong Kong Polytechnic University; Southern University of Science and Technology, Yu Pei Hong Kong Polytechnic University, Shuyun Liang Southern University of Science and Technology, Zezhong Xing Southern University of Science and Technology, Shin Hwei Tan Concordia University
DOI
16:50
20m
Talk
API Misuse Detection via Probabilistic Graphical Model
Technical Papers
Yunlong Ma Beihang University, Wentong Tian Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University, Li Li Beihang University
DOI
15:30 - 17:10
Program Repair 1Technical Papers at EI 7
Chair(s): Xiang Gao Beihang University
15:30
20m
Talk
Automated Program Repair via Conversation: Fixing 162 out of 337 Bugs for $0.42 Each using ChatGPT
Technical Papers
Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
15:50
20m
Talk
ThinkRepair: Self-Directed Automated Program Repair
Technical Papers
Xin Yin Zhejiang University, Chao Ni Zhejiang University, Shaohua Wang Central University of Finance and Economics, Zhenhao Li York University, Limin Zeng Zhejiang University, Xiaohu Yang Zhejiang University
DOI
16:10
20m
Talk
BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming Assignments
Technical Papers
Linna Xie Nanjing University, Chongmin Li Nanjing University, Yu Pei Hong Kong Polytechnic University, Tian Zhang Nanjing University, Minxue Pan Nanjing University
DOI
16:30
20m
Talk
CREF: An LLM-Based Conversational Software Repair Framework for Programming Tutors
Technical Papers
Boyang Yang Yanshan University; Beijing JudaoYouda Network Technology, Haoye Tian University of Melbourne, Weiguo Pian University of Luxembourg, Haoran Yu Beijing JudaoYouda Network Technology, Haitao Wang Beijing JudaoYouda Network Technology, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Shunfu Jin Yanshan University
DOI
16:50
20m
Talk
One Size Does Not Fit All: Multi-granularity Patch Generation for Better Automated Program RepairACM SIGSOFT Distinguished Paper Award
Technical Papers
Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Ming Wen Huazhong University of Science and Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology
DOI Pre-print
15:30 - 17:10
Testing and Repairing Neural NetworksTechnical Papers at EI 9 Hlawka
Chair(s): Mike Papadakis University of Luxembourg
15:30
20m
Talk
Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters
Technical Papers
Purvish Jajal Purdue University, Wenxin Jiang Purdue University, Arav Tewari Purdue University, Erik Kocinare Purdue University, Joseph Woo Purdue University, Anusha Sarraf Purdue University, Yung-Hsiang Lu Purdue University, George K. Thiruvathukal Loyola University Chicago, James C. Davis Purdue University
DOI Pre-print
15:50
20m
Talk
Interpretability Based Neural Network Repair
Technical Papers
Zuohui Chen Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Jun Zhou Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Youcheng Sun University of Manchester, Jingyi Wang Zhejiang University, Qi Xuan Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Xiaoniu Yang Zhejiang University of Technology; National Key Laboratory of Electromagnetic Space Security
DOI
16:10
20m
Talk
See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing
Technical Papers
Yuanyuan Yuan Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Zhendong Su ETH Zurich
DOI
16:30
20m
Talk
Isolation-Based Debugging for Neural Networks
Technical Papers
Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Youcheng Sun University of Manchester, Peng Cheng Zhejiang University, Jiming Chen Zhejiang University; Hangzhou Dianzi University
DOI
16:50
20m
Talk
Certified Continual Learning for Neural Network Regression
Technical Papers
Long H. Pham Singapore Management University, Jun Sun Singapore Management University
DOI
17:45 - 23:00
BanquetISSTA/ECOOP Social Events at Fuhrgassl-Huber

We will take buses from the conference venue to go to the banquet.

Thu 19 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

08:30 - 09:00
09:00 - 10:00
KeynoteKeynotes at EI 7
Chair(s): Michael Pradel University of Stuttgart
09:00
60m
Keynote
The Overlooked Steps in Program Analysis: Designing by People for People
Keynotes
K: Julia Rubin The University of British Columbia
10:00 - 10:30
10:30 - 11:50
Logging and Field BugsTechnical Papers at EI 10 Fritz Paschke
Chair(s): Willem Visser Amazon Web Services
10:30
20m
Research paper
A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We?
Technical Papers
Zhihan Jiang Chinese University of Hong Kong, Jinyang Liu Chinese University of Hong Kong, Junjie Huang Chinese University of Hong Kong, Yichen LI Chinese University of Hong Kong, Yintong Huo Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Zhuangbin Chen Sun Yat-sen University, Jieming Zhu Huawei Noah’s Ark Lab, Michael Lyu Chinese University of Hong Kong
DOI Pre-print
10:50
20m
Talk
FastLog: An End-to-End Method to Efficiently Generate and Insert Logging Statements
Technical Papers
Xiaoyuan Xie Wuhan University, Zhipeng Cai Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Jifeng Xuan Wuhan University
DOI
11:10
20m
Talk
Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs
Technical Papers
Shiwen Shan Sun Yat-sen University, Yintong Huo Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Yichen LI Chinese University of Hong Kong, Dan Li Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
DOI
11:30
20m
Talk
Foliage: Nourishing Evolving Software by Characterizing and Clustering Field Bugs
Technical Papers
Zhanyao Lei Shanghai Jiao Tong University, Yixiong Chen Shanghai Jiao Tong University, Mingyuan Xia AppetizerIO, Zhengwei Qi Shanghai Jiao Tong University
DOI
10:30 - 11:50
BlockchainTechnical Papers at EI 3 Sahulka
Chair(s): Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens
10:30
20m
Talk
DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3
Technical Papers
Zhiying Wu Sun Yat-sen University, Jiajing Wu Sun Yat-sen University, Hui Zhang Sun Yat-sen University, Ziwei Li Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Qing Xia Institute of Software at Chinese Academy of Sciences, Gang Fan Ant Group, Yi Zhen Independent
DOI
10:50
20m
Talk
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts
Technical Papers
Peilin Zheng Sun Yat-sen University, Bowei Su Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China, Neng Zhang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
DOI File Attached
11:10
20m
Talk
Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients
Technical Papers
Shuohan Wu Hong Kong Polytechnic University, Zihao Li Hong Kong Polytechnic University, Hao Zhou Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Jianfeng Li Xi’an Jiaotong University, Haoyu Wang Huazhong University of Science and Technology
DOI
11:30
20m
Talk
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications
Technical Papers
Maoyi Xie Nanyang Technological University, Ming Hu Nanyang Technological University, Ziqiao Kong Nanyang Technological University, Cen Zhang Nanyang Technological University, Yebo Feng Nanyang Technological University, Haijun Wang Xi’an Jiaotong University, Yue Xue MetaTrust Labs, Hao Zhang MetaTrust Labs, Ye Liu Nanyang Technological University, Yang Liu Nanyang Technological University
DOI
10:30 - 11:50
Program Repair 2Technical Papers at EI 7
Chair(s): Chao Peng ByteDance
10:30
20m
Talk
Automating Zero-Shot Patch Porting for Hard Forks
Technical Papers
Shengyi Pan Zhejiang University, You Wang Zhejiang University, Zhongxin Liu Zhejiang University, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University
DOI Pre-print
10:50
20m
Talk
Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial Bugs
Technical Papers
Yicheng Ouyang University of Illinois at Urbana-Champaign, Jun Yang University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
11:10
20m
Talk
Neurosymbolic Repair of Test Flakiness
Technical Papers
Yang Chen University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign
DOI
11:30
20m
Talk
AutoCodeRover: Autonomous Program Improvement
Technical Papers
Yuntong Zhang National University of Singapore, Haifeng Ruan National University of Singapore, Zhiyu Fan National University of Singapore, Abhik Roychoudhury National University of Singapore
DOI
10:30 - 11:50
Testing Neural NetworksTechnical Papers at EI 9 Hlawka
Chair(s): Paolo Tonella USI Lugano
10:30
20m
Talk
Distance-Aware Test Input Selection for Deep Neural Networks
Technical Papers
Zhong Li Nanjing University, Zhengfeng Xu Nanjing University, Ruihua Ji Nanjing University, Minxue Pan Nanjing University, Tian Zhang Nanjing University, Linzhang Wang Nanjing University, Xuandong Li Nanjing University
DOI
10:50
20m
Talk
Test Selection for Deep Neural Networks using Meta-Models with Uncertainty Metrics
Technical Papers
Demet Demir Middle East Technical University, Aysu Betin Can Middle East Technical University, Elif Surer Middle East Technical University
DOI
11:10
20m
Talk
Datactive: Data Fault Localization for Object Detection Systems
Technical Papers
Yining Yin Nanjing University, Yang Feng Nanjing University, Shihao Weng Nanjing University, Yuan Yao Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing University
DOI
11:30
20m
Talk
TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development
Technical Papers
Xiangshan Gao Zhejiang University; Huawei Technology, Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Jie Shi Huawei International, Peng Cheng Zhejiang University, Jiming Chen Zhejiang University; Hangzhou Dianzi University
DOI
12:00 - 13:30
13:30 - 14:50
WebAssembly and BrowsersTechnical Papers at EI 10 Fritz Paschke
Chair(s): Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich
13:30
20m
Talk
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment
Technical Papers
Jiashui Wang Zhejiang University, Peng Qian Zhejiang University, Xilin Huang Ant Group, Xinlei Ying Ant Group, Yan Chen Northwestern University, Shouling Ji Zhejiang University, Jianhai Chen Zhejiang University, Jundong Xie Ant Group, Long Liu Ant Group
DOI
13:50
20m
Talk
WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation
Technical Papers
Shangtong Cao Beijing University of Posts and Telecommunications, Ningyu He Peking University, Xinyu She Huazhong University of Science and Technology, Yixuan Zhang Peking University, Mu Zhang University of Utah, Haoyu Wang Huazhong University of Science and Technology
DOI
14:10
20m
Talk
Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation
Technical Papers
Wenxuan Zhao Fudan University, Ruiying Zeng Fudan University, Yangfan Zhou Fudan University
DOI
13:30 - 14:50
DatabasesTechnical Papers at EI 3 Sahulka
Chair(s): Manuel Rigger National University of Singapore
13:30
20m
Talk
Testing Gremlin-Based Graph Database Systems via Query Disassembling
Technical Papers
Yingying Zheng Institute of Software at Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences, Lei Tang Institute of Software at Chinese Academy of Sciences, Ziyu Cui Institute of Software at Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiansen Song Institute of Software at Chinese Academy of Sciences, Liang Xu Jinling Institute of Technology, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, Wei Wang Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Hua Zhong Institute of Software at Chinese Academy of Sciences, Tao Huang Institute of Software at Chinese Academy of Sciences
DOI
13:50
20m
Talk
SQLess: Dialect-Agnostic SQL Query Simplification
Technical Papers
Li Lin Xiamen University, Zongyin Hao Xiamen University, Chengpeng Wang Hong Kong University of Science and Technology, Zhuangda Wang Xiamen University, Rongxin Wu Xiamen University, Gang Fan Ant Group
DOI
14:10
20m
Talk
Testing Graph Database Systems with Graph-State Persistence Oracle
Technical Papers
Shuang Liu Renmin University of China, Junhao Lan Tianjin University, China, Xiaoning Du Monash University, Jiyuan Li Tianjin University, China, Wei Lu Renmin University of China, China, Jiajun Jiang Tianjin University, Xiaoyong Du Renmin University of China
DOI
13:30 - 14:50
Execution and ProfilingTechnical Papers at EI 7
Chair(s): Rohan Padhye Carnegie Mellon University
13:30
20m
Talk
MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination Indexing
Technical Papers
Tianyi Yang Chinese University of Hong Kong, Cheryl Lee Chinese University of Hong Kong, Jiacheng Shen Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Cong Feng Huawei Cloud Computing Technology, Yongqiang Yang Huawei Cloud Computing Technology, Michael Lyu Chinese University of Hong Kong
DOI
13:50
20m
Talk
Feedback-Directed Partial Execution
Technical Papers
Ishrak Hayet North Carolina State University, Adam Scott North Carolina State University, Marcelo d'Amorim North Carolina State University
DOI
14:10
20m
Talk
Define-Use Guided Path Exploration for Better Forced Execution
Technical Papers
Dongnan He Renmin University of China, Dongchen Xie Renmin University of China, Yujie Wang Renmin University of China, Wei You Renmin University of China, Bin Liang Renmin University of China, Jianjun Huang Renmin University of China, Wenchang Shi Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University
DOI
14:30
20m
Talk
SelfPiCo: Self-Guided Partial Code Execution with LLMs
Technical Papers
Zhipeng Xue , Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Shaohua Wang Central University of Finance and Economics, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University
DOI
13:30 - 14:50
Static analysisTechnical Papers at EI 9 Hlawka
Chair(s): Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE
13:30
20m
Talk
Precise Compositional Buffer Overflow Detection via Heap DisjointnessACM SIGSOFT Distinguished Paper Award
Technical Papers
Yiyuan Guo Hong Kong University of Science and Technology, Peisen Yao Zhejiang University, Charles Zhang Hong Kong University of Science and Technology
DOI Pre-print
13:50
20m
Talk
Finding Cuts in Static Analysis Graphs to Debloat Software
Technical Papers
Christoph Blumschein Hasso Plattner Institute; University of Potsdam, Fabio Niephaus Oracle Labs, Codrut Stancu Oracle Labs, Christian Wimmer Oracle Labs, Jens Lincke Hasso Plattner Institute; University of Potsdam, Robert Hirschfeld Hasso Plattner Institute; University of Potsdam
DOI Pre-print
14:10
20m
Talk
Scalable, Sound, and Accurate Jump Table Analysis
Technical Papers
Huan Nguyen Stony Brook University, Soumyakant Priyadarshan Stony Brook University, R. Sekar Stony Brook University
DOI
14:30
20m
Talk
Better Not Together: Staged Solving for Context-Free Language Reachability
Technical Papers
Chenghang Shi Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haofeng Li Institute of Computing Technology at Chinese Academy of Sciences, Jie Lu Institute of Computing Technology at Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI Pre-print
15:00 - 15:30
15:30 - 17:10
Vulnerabilities and MalwareTechnical Papers at EI 10 Fritz Paschke
Chair(s): Wei You Renmin University of China
15:30
20m
Talk
Silent Taint-Style Vulnerability Fixes Identification
Technical Papers
Zhongzhen Wen Nanjing University, Jiayuan Zhou Huawei, Minxue Pan Nanjing University, Shaohua Wang Central University of Finance and Economics, Xing Hu Zhejiang University, Tongtong Xu Huawei, Tian Zhang Nanjing University, Xuandong Li Nanjing University
DOI
15:50
20m
Talk
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor
Technical Papers
Zhenyu Ye Hunan University, Lei Zhou National University of Defense Technology, Fengwei Zhang Southern University of Science and Technology, Wenqiang Jin Hunan University, Zhenyu Ning Hunan University; Xinchuang Haihe Laboratory, Yupeng Hu Hunan University, Zheng Qin Hunan University
DOI
16:10
20m
Talk
Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset
Technical Papers
Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
DOI
16:30
20m
Talk
PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software
Technical Papers
Kaixuan Li East China Normal University; Nanyang Technological University, Jian Zhang Nanyang Technological University, Sen Chen Tianjin University, Han Liu East China Normal University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University
DOI Pre-print
16:50
20m
Talk
An Empirical Study of Static Analysis Tools for Secure Code Review
Technical Papers
Wachiraphan (Ping) Charoenwet University of Melbourne, Patanamon Thongtanunam University of Melbourne, Thuan Pham University of Melbourne, Christoph Treude Singapore Management University
DOI
15:30 - 16:50
DebuggingTechnical Papers at EI 3 Sahulka
Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security
15:30
20m
Talk
Traceback: A Fault Localization Technique for Molecular Programs
Technical Papers
Michael C. Gerten Iowa State University, James I. Lathrop Iowa State University, Myra Cohen Iowa State University
DOI
15:50
20m
Talk
C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging
Technical Papers
Xuezhi Song Fudan University, Yijian Wu Fudan University, Shuning Liu Fudan University, Bihuan Chen Fudan University, Yun Lin Shanghai Jiao Tong University, Xin Peng Fudan University
DOI
16:10
20m
Talk
Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-Call Bugs
Technical Papers
Arooba Shahoor Kyungpook National University, Jooyong Yi UNIST, Dongsun Kim Korea University
DOI
15:30 - 17:10
Code TransformationTechnical Papers at EI 7
Chair(s): Xiaoning Du Monash University
15:30
20m
Talk
One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural Network
Technical Papers
Di Cui Xidian University, Qiangqiang Wang Xidian University, Yutong Zhao University of Central Missouri, Jiaqi Wang Xidian University, Minjie Wei Xidian University, Jingzhao Hu Xidian University, Luqiao Wang Xidian University, Qingshan Li Xidian University
DOI
15:50
20m
Talk
CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature
Technical Papers
Chenyan Liu Shanghai Jiao Tong University; National University of Singapore, Yufan Cai Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yuhuan Huang Shanghai Jiao Tong University, Yunrui Pei Shanghai Jiao Tong University, Bo Jiang Bytedance Network Technology, Ping Yang Bytedance Network Technology, Jin Song Dong National University of Singapore, Hong Mei Shanghai Jiao Tong University
DOI
16:10
20m
Talk
Arfa: An Agile Regime-Based Floating-Point Optimization Approach for Rounding Errors
Technical Papers
Jinchen Xu Information Engineering University, Mengqi Cui Information Engineering University, Fei Li Information Engineering University, Zuoyan Zhang Hunan University, Hongru Yang Information Engineering University, Bei Zhou Information Engineering University, Jie Zhao Hunan University
DOI
16:30
20m
Talk
Automated Deep Learning Optimization via DSL-Based Source Code Transformation
Technical Papers
Ruixin Wang Purdue University, Minghai Lu Purdue University, Cody Hao Yu BosonAI, Yi-Hsiang Lai Amazon Web Services, Tianyi Zhang Purdue University
DOI
15:30 - 17:10
Analyzing Neural ModelsTechnical Papers at EI 9 Hlawka
Chair(s): Saeid Tizpaz-Niari University of Texas at El Paso
15:30
20m
Talk
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models
Technical Papers
Mingyi Zhou Monash University, Xiang Gao Beihang University, Pei Liu CSIRO’s Data61, John Grundy Monash University, Chunyang Chen TU Munich, Xiao Chen University of Newcastle, Li Li Beihang University
DOI
15:50
20m
Talk
Decomposition of Deep Neural Networks into Modules via Mutation Analysis
Technical Papers
Ali Ghanbari Auburn University
DOI
16:10
20m
Talk
Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware Prompts
Technical Papers
Hao Guan University of Queensland; Southern University of Science and Technology, Guangdong Bai University of Queensland, Yepang Liu Southern University of Science and Technology
DOI
16:30
20m
Talk
DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation
Technical Papers
Mingke Yang ShanghaiTech University, Yuqi Chen ShanghaiTech University, Yi Liu Nanyang Technological University, Ling Shi Nanyang Technological University
DOI
16:50
20m
Talk
Evaluating Deep Neural Networks in Deployment: A Comparative Study (Replicability Study)
Technical Papers
Eduard Pinconschi Carnegie Mellon University, Divya Gopinath KBR; NASA Ames, Rui Abreu INESC-ID; University of Porto, Corina S. Păsăreanu Carnegie Mellon University; NASA Ames
DOI
18:00 - 20:00

Fri 20 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

08:30 - 09:00
09:00 - 10:00
KeynoteKeynotes at EI 7
Chair(s): Maria Christakis TU Wien
09:00
60m
Keynote
Benchmarks and Replicability in Software Engineering Research: Challenges and Opportunities
Keynotes
K: René Just University of Washington
10:00 - 10:30
10:30 - 11:50
Compilers and DecompilersTechnical Papers at EI 10 Fritz Paschke
Chair(s): Sang Kil Cha KAIST
10:30
20m
Talk
Inconsistencies in TeX-Produced Documents
Technical Papers
Jovyn Tan National University of Singapore, Manuel Rigger National University of Singapore
DOI Pre-print
10:50
20m
Talk
Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis
Technical Papers
Chenyao Suo Tianjin University, Junjie Chen Tianjin University, Shuang Liu Renmin University of China, Jiajun Jiang Tianjin University, Yingquan Zhao Tianjin University, Jianrong Wang Tianjin University
DOI
11:10
20m
Talk
Towards Understanding the Bugs in Solidity Compiler
Technical Papers
Haoyang Ma Hong Kong University of Science and Technology, Wuqi Zhang Hong Kong University of Science and Technology, Qingchao Shen Tianjin University, Yongqiang Tian Hong Kong University of Science and Technology, Junjie Chen Tianjin University, Shing-Chi Cheung Hong Kong University of Science and Technology
DOI
11:30
20m
Talk
Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines
Technical Papers
Gao Cuiying Huazhong University of Science and Technology; JD.com, Yueming Wu Nanyang Technological University, Heng Li Huazhong University of Science and Technology, Wei Yuan Huazhong University of Science and Technology, Haoyu Jiang Huazhong University of Science and Technology, Qidan He JD.com, Yang Liu Nanyang Technological University
DOI
10:30 - 11:50
Android and ARTechnical Papers at EI 3 Sahulka
Chair(s): René Just University of Washington
10:30
20m
Talk
Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries
Technical Papers
Hao Xiong Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Qinming Dai Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Rui Chang Zhejiang University, Mingran Qiu Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Renxiang Wang Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Wenbo Shen Zhejiang University, Yajin Zhou Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center
DOI
10:50
20m
Talk
Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps
Technical Papers
Dingbang Wang University of Connecticut, Yu Zhao University of Cincinnati, Sidong Feng Monash University, Zhaoxu Zhang University of Southern California, William G.J. Halfond University of Southern California, Chunyang Chen TU Munich, Xiaoxia Sun China Mobile (Suzhou) Software Technology, Jiangfan Shi Zhejiang University, Tingting Yu University of Connecticut
DOI
11:10
20m
Talk
NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps
Technical Papers
Jikai Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
DOI
11:30
20m
Talk
Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes
Technical Papers
Xiaoyi Yang Rochester Institute of Technology, Yuxing Wang Rochester Institute of Technology, Tahmid Rafi University of Texas at San Antonio, Dongfang Liu Rochester Institute of Technology, Xiaoyin Wang University of Texas at San Antonio, Xueling Zhang Rochester Institute of Technology
DOI
10:30 - 11:50
Fuzzing 2Technical Papers at EI 7
Chair(s): Marcel Böhme MPI-SP, Bochum
10:30
20m
Talk
Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization
Technical Papers
Zhijie Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Liwei Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haolai Wei Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Gang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
10:50
20m
Talk
FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation
Technical Papers
Xizhe Yin Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Zixi Liu Nanjing University, Hongwang Liu Nanjing University, Baowen Xu Nanjing University
DOI
11:10
20m
Talk
DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling
Technical Papers
Haoran Fang Shanghai Jiao Tong University, Kaikai Zhang Shanghai Jiao Tong University, Donghui Yu Shanghai Jiao Tong University, Yuanyuan Zhang Shanghai Jiao Tong University
DOI Pre-print
11:30
20m
Talk
Logos: Log Guided Fuzzing for Protocol Implementations
Technical Papers
Feifan Wu Tsinghua University, Zhengxiong Luo National University of Singapore, Yanyang Zhao Tsinghua University, Qingpeng Du Beijing University of Posts and Telecommunications, Junze Yu Tsinghua University, Ruikang Peng Central South University, Heyuan Shi Central South University, Yu Jiang Tsinghua University
DOI
10:30 - 11:50
Call Graphs and Static AnalysisTechnical Papers at EI 9 Hlawka
Chair(s): Julia Rubin The University of British Columbia
10:30
20m
Talk
Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language Features
Technical Papers
Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Tobias Roth TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Michael Reif CQSE, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE
DOI Pre-print
10:50
20m
Talk
Total Recall? How Good Are Static Call Graphs Really?
Technical Papers
Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Anemone Kampkötter TU Dortmund, Johannes Düsing TU Dortmund, Tobias Roth TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Ben Hermann TU Dortmund, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE
DOI Pre-print
11:10
20m
Talk
Call Graph Soundness in Android Static Analysis
Technical Papers
Jordan Samhi CISPA Helmholtz Center for Information Security, René Just University of Washington, Tegawendé F. Bissyandé University of Luxembourg, Michael D. Ernst University of Washington, Jacques Klein University of Luxembourg
Link to publication DOI Pre-print
11:30
20m
Talk
Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT
Technical Papers
Elvira Albert Complutense University of Madrid, Jesús Correas Complutense University of Madrid, Pablo Gordillo Complutense University of Madrid, Guillermo Román-Díez Universidad Politécnica de Madrid, Albert Rubio Complutense University of Madrid
DOI
12:00 - 13:30
13:30 - 14:50
Smart ContractsTechnical Papers at EI 10 Fritz Paschke
Chair(s): Michael Pradel University of Stuttgart
13:30
20m
Talk
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis
Technical Papers
Shuwei Song University of Electronic Science and Technology of China, Jiachi Chen Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Xiapu Luo Hong Kong Polytechnic University, Teng Li University of Electronic Science and Technology of China, Wenwu Yang University of Electronic Science and Technology of China, Leqing Wang University of Electronic Science and Technology of China, Weijie Zhang Jiangsu University of Science and Technology, Feng Luo Hong Kong Polytechnic University, Zheyuan He University of Electronic Science and Technology of China, Yi Lu BitsLab, Pan Li MoveBit
DOI
13:50
20m
Talk
FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas Fees
Technical Papers
Yunqi Liu Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology
DOI
14:10
20m
Talk
Identifying Smart Contract Security Issues in Code Snippets from Stack OverflowACM SIGSOFT Distinguished Paper Award
Technical Papers
Jiachi Chen Sun Yat-sen University, Chong Chen Sun Yat-sen University, Jiang Hu Sun Yat-sen University, John Grundy Monash University, Yanlin Wang Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Zibin Zheng Sun Yat-sen University
DOI Pre-print
14:30
20m
Talk
Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis
Technical Papers
Mingxi Ye Sun Yat-sen University, Xingwei Lin Zhejiang University, Yuhong Nan Sun Yat-sen University, Jiajing Wu Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
DOI
13:30 - 14:50
Safety-Critical SystemsTechnical Papers at EI 3 Sahulka
Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign
13:30
20m
Talk
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing
Technical Papers
Zhongrui Li Fudan University, Jiarun Dai Fudan University, Zongan Huang Fudan University, Nianhao You Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
DOI
13:50
20m
Talk
Exploration-Driven Reinforcement Learning for Avionic System Fault Detection (Experience Paper)ACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI
14:10
20m
Talk
DiaVio: LLM-Empowered Diagnosis of Safety Violations in ADS Simulation Testing
Technical Papers
You Lu Fudan University, Yifan Tian Fudan University, Yuyang Bi Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University
DOI
14:30
20m
Talk
CooTest: An Automated Testing Approach for V2X Communication Systems
Technical Papers
An Guo Nanjing University, Xinyu Gao Nanjing University, Zhenyu Chen Nanjing University, Yuan Xiao Nanjing University, Jiakai Liu Nanjing University, Xiuting Ge Nanjing University, Weisong Sun Nanjing University, Chunrong Fang Nanjing University
DOI Pre-print
13:30 - 14:50
LLMs for CodeTechnical Papers at EI 7
Chair(s): Jacques Klein University of Luxembourg
13:30
20m
Talk
Bridge and Hint: Extending Pre-trained Language Models for Long-Range Code
Technical Papers
Yujia Chen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Zezhou Yang Harbin Institute of Technology, Hongyu Zhang Chongqing University, Qing Liao Harbin Institute of Technology
DOI
13:50
20m
Talk
CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding
Technical Papers
Dong Li Chongqing University, Meng Yan Chongqing University, Yaosheng Zhang Chongqing University, Zhongxin Liu Zhejiang University, Chao Liu Chongqing University, Xiaohong Zhang Chongqing University, Ting Chen University of Electronic Science and Technology of China, David Lo Singapore Management University
DOI
14:10
20m
Talk
Oracle-Guided Program Selection from Large Language Models
Technical Papers
Zhiyu Fan National University of Singapore, Haifeng Ruan National University of Singapore, Sergey Mechtaev Peking University, Abhik Roychoudhury National University of Singapore
DOI
14:30
20m
Talk
How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation
Technical Papers
Cen Zhang Nanyang Technological University, Yaowen Zheng Nanyang Technological University, Mingqiang Bai Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Ma Nanyang Technological University, Xiaofei Xie Singapore Management University, Yuekang Li UNSW, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University
DOI
13:30 - 14:50
TestingTechnical Papers at EI 9 Hlawka
Chair(s): Myra Cohen Iowa State University
13:30
20m
Talk
Segment-Based Test Case Prioritization: A Multi-objective Approach
Technical Papers
Hieu Huynh Katalon, Nhu Pham Katalon; Ho Chi Minh City University of Science, Tien N. Nguyen University of Texas at Dallas, Vu Nguyen Katalon; Ho Chi Minh City University of Science; Vietnam National University
DOI
13:50
20m
Talk
Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable Systems
Technical Papers
Chuan Luo Beihang University, Shuangyu Lyu Beihang University, Qiyuan Zhao National University of Singapore, Wei Wu Central South University; Xiangjiang Laboratory, Hongyu Zhang Chongqing University, Chunming Hu Beihang University
DOI
14:10
20m
Talk
Synthesis-Based Enhancement for GUI Test Case Migration
Technical Papers
Yakun Zhang Peking University, Qihao Zhu DeepSeek-AI, Jiwei Yan Institute of Software at Chinese Academy of Sciences, Chen Liu Peking University, Wenjie Zhang Peking University, Yifan Zhao Peking University, Dan Hao Peking University, Lu Zhang Peking University
DOI
14:30
20m
Talk
Revisiting Test-Case Prioritization on Long-Running Test Suites
Technical Papers
Runxiang Cheng University of Illinois at Urbana-Champaign, Shuai Wang University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign
DOI
15:00 - 15:30
15:30 - 16:30
Analysis of Code OriginTechnical Papers at EI 10 Fritz Paschke
Chair(s): Darko Marinov University of Illinois at Urbana-Champaign
15:30
20m
Talk
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge
Technical Papers
Xiaowei Guo Huazhong University of Science and Technology, Cai Fu Huazhong University of Science and Technology, Juan Chen Huazhong University of Science and Technology, Hongle Liu Huazhong University of Science and Technology, Lansheng Han Huazhong University of Science and Technology, Wenjin Li NSFOCUS Technologies Group
DOI
15:50
20m
Talk
Your “Notice” Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking
Technical Papers
Kaifeng Huang Tongji University, Yingfeng Xia Fudan University, Bihuan Chen Fudan University, Siyang He Fudan University, Huazheng Zeng Fudan University, Zhuotong Zhou Fudan University, Jin Guo Fudan University, Xin Peng Fudan University
DOI
16:10
20m
Talk
DeLink: Source File Information Recovery in Binaries
Technical Papers
Zhe Lang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Xiaohui Chen China Mobile Research Institute, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhanwei Song Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
15:30 - 16:30
Models of CodeTechnical Papers at EI 7
Chair(s): Jürgen Cito TU Wien
15:30
20m
Talk
FDI: Attack Neural Code Generation Systems through User Feedback Channel
Technical Papers
Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Xiapu Luo Hong Kong Polytechnic University, Fu Song Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Nanjing Institute of Software Technology, David Lo Singapore Management University, Li Li Beihang University
DOI
15:50
20m
Talk
CoderUJB: An Executable and Unified Java Benchmark for Practical Programming Scenarios
Technical Papers
Zhengran Zeng Peking University, Yidong Wang Peking University, Rui Xie Peking University, Wei Ye Peking University, Shikun Zhang Peking University
DOI
16:10
20m
Talk
CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision
Technical Papers
Hao Wang Tsinghua University, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Zihan Sha Information Engineering University, Mingyang Sun University of Electronic Science and Technology of China, Yuchen Zhou Beijing University of Technology, Wenyu Zhu Tsinghua University, Wenju Sun Tsinghua University, Han Qiu Tsinghua University, Xi Xiao Tsinghua University
DOI
15:30 - 16:30
Builds and TestingTechnical Papers at EI 9 Hlawka
Chair(s): Zeyu Sun Institute of Software at Chinese Academy of Sciences
15:30
20m
Talk
Enhancing Multi-agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation
Technical Papers
Xuyan Ma Institute of Software at Chinese Academy of Sciences, Yawen Wang Institute of Software at Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences, Xiaofei Xie Singapore Management University, Boyu Wu Institute of Software at Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences, Fanjiang Xu Institute of Software at Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences
DOI
15:50
20m
Talk
Commit Artifact Preserving Build Prediction
Technical Papers
Guoqing Wang Peking University, Zeyu Sun Institute of Software at Chinese Academy of Sciences, Yizhou Chen Peking University, Yifan Zhao Peking University, Qingyuan Liang Peking University, Dan Hao Peking University
DOI
16:10
20m
Talk
Detecting Build Dependency Errors in Incremental Builds
Technical Papers
Jun Lyu Nanjing University, Shanshan Li Nanjing University, He Zhang Nanjing University, Yang Zhang Nanjing University, Guoping Rong Nanjing University, Manuel Rigger National University of Singapore
DOI
16:30 - 17:00
ISSTA 2025 Preview and ClosingKeynotes at EI 7
Chair(s): Maria Christakis TU Wien, Michael Pradel University of Stuttgart

Unscheduled Events

Not scheduled
Talk
LLM4Fin: Fully Automating LLM-Powered Test Case Generation for FinTech Software Acceptance Testing
Technical Papers
Zhiyi Xue East China Normal University, Liangguo Li East China Normal University, Senyue Tian East China Normal University, Xiaohong Chen East China Normal University, Pingping Li Guotai Junan Securities, Liangyu Chen East China Normal University, Tingting Jiang Guotai Junan Securities, Min Zhang East China Normal University
DOI
Not scheduled
Talk
Multi-modal Learning for WebAssembly Reverse EngineeringACM SIGSOFT Distinguished Paper Award
Technical Papers
Hanxian Huang University of California at San Diego, Jishen Zhao University of California at San Diego
DOI Media Attached
Not scheduled
Talk
Evaluating the Effectiveness of Decompilers
Technical Papers
Ying Cao Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Runze Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Ruigang Liang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI Media Attached
Not scheduled
Talk
DBStorm: Generating Various Effective Workloads for Testing Isolation Levels
Technical Papers
Keqiang Li East China Normal University, Siyang Weng East China Normal University, Lyu Ni East China Normal University, Chengcheng Yang East China Normal University, Rong Zhang East China Normal University, Xuan Zhou East China Normal University, Aoying Zhou East China Normal University
DOI
Not scheduled
Talk
Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing
Technical Papers
Tong Wang Academy of Military Sciences, Taotao Gu Academy of Military Sciences, Huan Deng Academy of Military Sciences, Hu Li Academy of Military Sciences, Xiaohui Kuang Academy of Military Sciences, Gang Zhao Academy of Military Sciences
DOI Pre-print Media Attached

Accepted Papers

Title
AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code GenerationACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI Pre-print
A Large-Scale Empirical Study on Improving the Fairness of Image Classification Models
Technical Papers
DOI
A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We?
Technical Papers
DOI Pre-print
An Empirical Examination of Fuzzer Mutator Performance
Technical Papers
DOI
An Empirical Study of Static Analysis Tools for Secure Code Review
Technical Papers
DOI
An Empirical Study on Kubernetes Operator Bugs
Technical Papers
DOI
An In-Depth Study of Runtime Verification Overheads during Software TestingACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI
API Misuse Detection via Probabilistic Graphical Model
Technical Papers
DOI
Arfa: An Agile Regime-Based Floating-Point Optimization Approach for Rounding Errors
Technical Papers
DOI
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar InferenceACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI
Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries
Technical Papers
DOI
AutoCodeRover: Autonomous Program Improvement
Technical Papers
DOI
Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph
Technical Papers
DOI
Automated Deep Learning Optimization via DSL-Based Source Code Transformation
Technical Papers
DOI
Automated Program Repair via Conversation: Fixing 162 out of 337 Bugs for $0.42 Each using ChatGPT
Technical Papers
DOI
Automating Zero-Shot Patch Porting for Hard Forks
Technical Papers
DOI Pre-print
Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial Bugs
Technical Papers
DOI
Better Not Together: Staged Solving for Context-Free Language Reachability
Technical Papers
DOI Pre-print
Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable Systems
Technical Papers
DOI
BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming Assignments
Technical Papers
DOI
Bridge and Hint: Extending Pre-trained Language Models for Long-Range Code
Technical Papers
DOI
Bugs in Pods: Understanding Bugs in Container Runtime Systems
Technical Papers
DOI
C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging
Technical Papers
DOI
Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks
Technical Papers
DOI
Call Graph Soundness in Android Static Analysis
Technical Papers
Link to publication DOI Pre-print
CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection
Technical Papers
DOI
Certified Continual Learning for Neural Network Regression
Technical Papers
DOI
Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks
Technical Papers
DOI
CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision
Technical Papers
DOI
CoderUJB: An Executable and Unified Java Benchmark for Practical Programming Scenarios
Technical Papers
DOI
CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature
Technical Papers
DOI
Commit Artifact Preserving Build Prediction
Technical Papers
DOI
CooTest: An Automated Testing Approach for V2X Communication Systems
Technical Papers
DOI Pre-print
CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding
Technical Papers
DOI
CREF: An LLM-Based Conversational Software Repair Framework for Programming Tutors
Technical Papers
DOI
Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing
Technical Papers
DOI Pre-print Media Attached
DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3
Technical Papers
DOI
Datactive: Data Fault Localization for Object Detection Systems
Technical Papers
DOI
DBStorm: Generating Various Effective Workloads for Testing Isolation Levels
Technical Papers
DOI
DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling
Technical Papers
DOI Pre-print
Decomposition of Deep Neural Networks into Modules via Mutation Analysis
Technical Papers
DOI
Define-Use Guided Path Exploration for Better Forced Execution
Technical Papers
DOI
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications
Technical Papers
DOI
DeLink: Source File Information Recovery in Binaries
Technical Papers
DOI
Detecting Build Dependency Errors in Incremental Builds
Technical Papers
DOI
DiaVio: LLM-Empowered Diagnosis of Safety Violations in ADS Simulation Testing
Technical Papers
DOI
Distance-Aware Test Input Selection for Deep Neural Networks
Technical Papers
DOI
DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation
Technical Papers
DOI
Domain Adaptation for Code Model-Based Unit Test Case Generation
Technical Papers
DOI
Efficient DNN-Powered Software with Fair Sparse Models
Technical Papers
DOI Pre-print
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis
Technical Papers
DOI
Enhancing Multi-agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation
Technical Papers
DOI
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge
Technical Papers
DOI
Enhancing ROS System Fuzzing through Callback Tracing
Technical Papers
DOI
Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java Programs
Technical Papers
DOI
Evaluating Deep Neural Networks in Deployment: A Comparative Study (Replicability Study)
Technical Papers
DOI
Evaluating the Effectiveness of Decompilers
Technical Papers
DOI Media Attached
Exploration-Driven Reinforcement Learning for Avionic System Fault Detection (Experience Paper)ACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI
Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs
Technical Papers
DOI
FastLog: An End-to-End Method to Efficiently Generate and Insert Logging Statements
Technical Papers
DOI
FDI: Attack Neural Code Generation Systems through User Feedback Channel
Technical Papers
DOI
Feedback-Directed Partial Execution
Technical Papers
DOI
Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps
Technical Papers
DOI
Finding Cuts in Static Analysis Graphs to Debloat Software
Technical Papers
DOI Pre-print
Foliage: Nourishing Evolving Software by Characterizing and Clustering Field Bugs
Technical Papers
DOI
Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients
Technical Papers
DOI
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor
Technical Papers
DOI
FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation
Technical Papers
DOI
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion
Technical Papers
DOI
FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas Fees
Technical Papers
DOI
Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation
Technical Papers
DOI
Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis
Technical Papers
DOI
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Technical Papers
DOI Pre-print
Guardian: A Runtime Framework for LLM-Based UI Exploration
Technical Papers
DOI
How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation
Technical Papers
DOI
Identifying Smart Contract Security Issues in Code Snippets from Stack OverflowACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI Pre-print
Inconsistencies in TeX-Produced Documents
Technical Papers
DOI Pre-print
Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters
Technical Papers
DOI Pre-print
Interpretability Based Neural Network Repair
Technical Papers
DOI
Interprocedural Path Complexity Analysis
Technical Papers
DOI
Isolation-Based Debugging for Neural Networks
Technical Papers
DOI
Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware Prompts
Technical Papers
DOI
Large Language Models for Equivalent Mutant Detection: How Far Are We?ACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI Pre-print
Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace Checking
Technical Papers
DOI
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts
Technical Papers
DOI File Attached
LLM4Fin: Fully Automating LLM-Powered Test Case Generation for FinTech Software Acceptance Testing
Technical Papers
DOI
Logos: Log Guided Fuzzing for Protocol Implementations
Technical Papers
DOI
LPR: Large Language Models-Aided Program Reduction
Technical Papers
DOI
Ma11y: A Mutation Framework for Web Accessibility Testing
Technical Papers
DOI
Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset
Technical Papers
DOI
MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination Indexing
Technical Papers
DOI
Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis
Technical Papers
DOI
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models
Technical Papers
DOI
Multi-modal Learning for WebAssembly Reverse EngineeringACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI Media Attached
NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps
Technical Papers
DOI
NeuFair: Neural Network Fairness Repair with Dropout
Technical Papers
DOI
Neurosymbolic Repair of Test Flakiness
Technical Papers
DOI
One Size Does Not Fit All: Multi-granularity Patch Generation for Better Automated Program RepairACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI Pre-print
One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural Network
Technical Papers
DOI
Oracle-Guided Program Selection from Large Language Models
Technical Papers
DOI
PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software
Technical Papers
DOI Pre-print
Policy Testing with MDPFuzz (Replicability Study)ACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI
Practitioners’ Expectations on Automated Test Generation
Technical Papers
DOI
Precise Compositional Buffer Overflow Detection via Heap DisjointnessACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI Pre-print
Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-Call Bugs
Technical Papers
DOI
Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization
Technical Papers
DOI
Reproducing Timing-Dependent GUI Flaky Tests in Android Apps via a Single Event Delay
Technical Papers
DOI
Revisiting Test-Case Prioritization on Long-Running Test Suites
Technical Papers
DOI
Scalable, Sound, and Accurate Jump Table Analysis
Technical Papers
DOI
SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection
Technical Papers
DOI
See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing
Technical Papers
DOI
Segment-Based Test Case Prioritization: A Multi-objective Approach
Technical Papers
DOI
SelfPiCo: Self-Guided Partial Code Execution with LLMs
Technical Papers
DOI
Semantic Constraint Inference for Web Form Test Generation
Technical Papers
DOI
Silent Taint-Style Vulnerability Fixes Identification
Technical Papers
DOI
Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC
Technical Papers
DOI
SQLess: Dialect-Agnostic SQL Query Simplification
Technical Papers
DOI
Synthesis-Based Enhancement for GUI Test Case Migration
Technical Papers
DOI
Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT
Technical Papers
DOI
Synthesizing Boxes Preconditions for Deep Neural Networks
Technical Papers
DOI
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment
Technical Papers
DOI
TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development
Technical Papers
DOI
Testing Graph Database Systems with Graph-State Persistence Oracle
Technical Papers
DOI
Testing Gremlin-Based Graph Database Systems via Query Disassembling
Technical Papers
DOI
Test Selection for Deep Neural Networks using Meta-Models with Uncertainty Metrics
Technical Papers
DOI
ThinkRepair: Self-Directed Automated Program Repair
Technical Papers
DOI
Total Recall? How Good Are Static Call Graphs Really?
Technical Papers
DOI Pre-print
Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes
Technical Papers
DOI
Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement
Technical Papers
DOI
Towards Understanding the Bugs in Solidity Compiler
Technical Papers
DOI
Toward the Automated Localization of Buggy Mobile App UIs from Bug Descriptions
Technical Papers
DOI
Traceback: A Fault Localization Technique for Molecular Programs
Technical Papers
DOI
Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines
Technical Papers
DOI
Understanding Misconfigurations in ROS: An Empirical Study and Current Approaches
Technical Papers
DOI Pre-print Media Attached
Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language Features
Technical Papers
DOI Pre-print
UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing
Technical Papers
DOI
UPBEAT: Test Input Checks of Q# Quantum Libraries
Technical Papers
DOI
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing
Technical Papers
DOI
VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information Extraction
Technical Papers
DOI Pre-print
Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation
Technical Papers
DOI
WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation
Technical Papers
DOI
When to Stop? Towards Efficient Code Generation in LLMs with Excess Token PreventionACM SIGSOFT Distinguished Paper Award
Technical Papers
DOI
Your “Notice” Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking
Technical Papers
DOI

Call for Papers

ISSTA invites three kinds of submissions. The majority of submissions is expected to be “Research Papers”, but submissions that best fit the description of “Experience Papers” or “Replicability Studies” should be submitted as such.

Research Papers

Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.

Experience Papers

Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of software testing and analysis methods or tools.

Replicability Studies

ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artifact only, but instead to perform a comparative experiment of multiple related approaches.

In particular, replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): The measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artifacts which they develop completely independently. This means that it is also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:

  • Depth and breadth of experiments
  • Clarity of writing
  • Appropriateness of conclusions
  • Amount of useful, actionable insights
  • Availability of artifacts

We expect replicability studies to clearly point out the artifacts the study is built on, and to submit those artifacts to the artifact evaluation. Artifacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.

Two Submission Deadlines and Major Revisions

ISSTA 2024 features two submission deadlines. The instructions in this call apply to both deadlines. You can choose to submit at either deadline. Only papers submitted to the first deadline may receive a chance to submit a major revision of the initial submission to the second deadline. Papers submitted to the second deadline will be either accepted or rejected, i.e., there is no option for a major revision.

Papers that are rejected during the first round may not be resubmitted to the second round. Authors who try to bypass this rule (e.g., by changing the paper title without significantly changing paper content, or by making small changes to the paper content) will have their papers desk-rejected without further consideration. Papers rejected from the first or second submission round can, of course, be submitted to ISSTA 2025 without any restrictions.

Submission Guidelines

Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for ISSTA. By submitting an article to an ACM Publication, authors are acknowledging that that all co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of the paper, in addition to other potential penalties, as per ACM Publications Policy.

Research Papers, Experience Papers, and Replicability Studies should be at most 10 pages in length, with at most 2 additional pages for references only. The page limit is strict, i.e., papers that take more than 10 pages for anything apart from references (including any section, figure, text, or appendix), will be desk-rejected. Experience papers and replicability studies should clearly specify their category in the paper title upon submission, e.g., “XXX (Experience Paper)”. All authors should use the official “ACM Master article template”, which can be obtained from the ACM Proceedings Template pages. Latex users should use the “sigconf” option, as well as the “review” (to produce line numbers for easy reference by the reviewers) and “anonymous” (omitting author names) options. To that end, the following Latex code can be placed at the start of the Latex document:

\documentclass[sigconf,review, anonymous]{acmart}
\acmConference[ISSTA 2024]{ACM SIGSOFT International Symposium on Software Testing and Analysis}{16-20 September, 2024}{Vienna, Austria}

Submit your papers via the HotCRP ISSTA 2024 submission website.

Each submission will be reviewed by at least three members of the program committee. Authors will have an opportunity to respond to reviews during a rebuttal period. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation, appropriate comparison to related work, and verifiability/transparency of the work. Some papers may have more than three reviews, as the PC chair may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The authors will have a chance to read the additional reviews and respond to them during the additional short response period. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.

Double-blind Reviewing

ISSTA 2024 will conduct double-blind reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.

Authors have the right to upload preprints on arXiv or similar sites, but they must avoid specifying that the paper was submitted to ISSTA.

Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.

Open Science Policy and “Data Availability” Section

ISSTA has adopted an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles, and encourage all contributing authors to disclose data to increase reproducibility and replicability.

Upon submission, authors are asked to make their code, data, etc. available to the program committee, or to comment on why this is not possible or desirable. Data must be shared in an anonymized way (e.g., no information on authors/affiliations in the code) via a site that reveals neither the authors’ nor the reviewers’ identities (e.g., not via Google Drive). At least one of the reviewers will check the provided data. While sharing the data is not mandatory for submission or acceptance, it will inform the program committee’s decision. Furthermore, we ask authors to provide a supporting statement on the data availability (or lack thereof) in their submitted papers in a section named “Data Availability” after the Conclusion section.

Publication Date

The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of your conference. The official publication date affects the deadline for any patent filings related to published work.

Questions? Use the ISSTA Technical Papers contact form.