The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.
ISSTA 2024 will feature two submission deadlines. You can choose to submit at either deadline, but papers submitted to the first deadline may receive a chance to submit a major revision of the initial submission to the second deadline. Papers submitted to the second deadline will be either accepted or rejected, i.e., there is no option for a major revision.
Wed 18 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:00 - 08:30 | |||
08:30 - 09:00 | Opening and AwardsKeynotes at EI 7 Chair(s): Maria Christakis TU Wien, Michael Pradel University of Stuttgart | ||
10:00 - 10:30 | |||
10:30 - 11:50 | Code Mutation and ReductionTechnical Papers at EI 10 Fritz Paschke Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
10:30 20mTalk | Large Language Models for Equivalent Mutant Detection: How Far Are We?ACM SIGSOFT Distinguished Paper Award Technical Papers Zhao Tian Tianjin University, Honglin Shu Kyushu University, Dong Wang Tianjin University, Xuejie Cao Tianjin University, Yasutaka Kamei Kyushu University, Junjie Chen Tianjin University DOI Pre-print | ||
10:50 20mTalk | An Empirical Examination of Fuzzer Mutator Performance Technical Papers James Kukucka George Mason University, Luís Pina University of Illinois at Chicago, Paul Ammann George Mason University, Jonathan Bell Northeastern University DOI | ||
11:10 20mTalk | Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java Programs Technical Papers Benjamin Kushigian University of Washington, Samuel Kaufman University of Washington, Ryan Featherman University of Washington, Hannah Potter University of Washington, Ardi Madadi University of Washington, René Just University of Washington DOI | ||
11:30 20mTalk | LPR: Large Language Models-Aided Program Reduction Technical Papers Mengxiao Zhang University of Waterloo, Yongqiang Tian Hong Kong University of Science and Technology, Zhenyang Xu University of Waterloo, Yiwen Dong University of Waterloo, Shin Hwei Tan Concordia University, Chengnian Sun University of Waterloo DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Toward the Automated Localization of Buggy Mobile App UIs from Bug Descriptions Technical Papers Antu Saha William & Mary, Yang Song William & Mary, Junayed Mahmud University of Central Florida, Ying Zhou George Mason University, Kevin Moran University of Central Florida, Oscar Chaparro William & Mary DOI | ||
10:50 20mTalk | Reproducing Timing-Dependent GUI Flaky Tests in Android Apps via a Single Event Delay Technical Papers Xiaobao Cai Fudan University, Zhen Dong Fudan University, Yongjiang Wang Fudan University, Abhishek Tiwari University of Passau, Xin Peng Fudan University DOI | ||
11:10 20mTalk | Semantic Constraint Inference for Web Form Test Generation Technical Papers Parsa Alian University of British Columbia, Noor Nashid University of British Columbia, Mobina Shahbandeh University of British Columbia, Ali Mesbah University of British Columbia DOI | ||
11:30 20mTalk | Guardian: A Runtime Framework for LLM-Based UI Exploration Technical Papers Dezhi Ran Peking University, Hao Wang Peking University, Zihe Song University of Texas at Dallas, Mengzhou Wu Peking University, Yuan Cao Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Tao Xie Peking University DOI |
10:30 - 11:50 | |||
10:30 20mTalk | AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code GenerationACM SIGSOFT Distinguished Paper Award Technical Papers Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Zhou Yang Singapore Management University, Li Li Beihang University, David Lo Singapore Management University DOI Pre-print | ||
10:50 20mTalk | When to Stop? Towards Efficient Code Generation in LLMs with Excess Token PreventionACM SIGSOFT Distinguished Paper Award Technical Papers Lianghong Guo Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Ensheng Shi Xi’an Jiaotong University, Wanjun Zhong Sun Yat-sen University, Hongyu Zhang Chongqing University, Jiachi Chen Sun Yat-sen University, Ruikai Zhang Huawei Cloud Computing Technologies, Yuchi Ma Huawei Cloud Computing Technologies, Zibin Zheng Sun Yat-sen University DOI | ||
11:10 20mTalk | FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion Technical Papers Qi Guo Tianjin University, Xiaohong Li Tianjin University, Xiaofei Xie Singapore Management University, Shangqing Liu Nanyang Technological University, Ze Tang Nanjing University, Ruitao Feng Singapore Management University, Junjie Wang Tianjin University, Jidong Ge Nanjing University, Lei Bu Nanjing University DOI | ||
11:30 20mTalk | Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks Technical Papers Yuxin Qiu University of California at Riverside, Jie Hu University of California at Riverside, Qian Zhang University of California at Riverside, Heng Yin University of California at Riverside DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Policy Testing with MDPFuzz (Replicability Study)ACM SIGSOFT Distinguished Paper Award Technical Papers Quentin Mazouni Simula Research Laboratory, Helge Spieker Simula Research Laboratory, Arnaud Gotlieb Simula Research Laboratory, Mathieu Acher University of Rennes - Inria - CNRS - IRISA DOI | ||
10:50 20mTalk | Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation Technical Papers DOI | ||
11:10 20mTalk | Enhancing ROS System Fuzzing through Callback Tracing Technical Papers Yuheng Shen Tsinghua University, Jianzhong Liu Tsinghua University, Yiru Xu Tsinghua University, Hao Sun ETH Zurich, Mingzhe Wang Tsinghua University, Nan Guan City University of Hong Kong, Heyuan Shi Central South University, Yu Jiang Tsinghua University DOI | ||
11:30 20mTalk | Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC Technical Papers Haolai Wei Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Liwei Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhijie Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Gang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI |
12:00 - 13:30 | |||
12:00 - 13:30 | Diversity and Inclusion LunchISSTA/ECOOP Social Events at EI 1 Petritsch https://conf.researchr.org/track/issta-ecoop-2024/issta-ecoop-2024-diversity | ||
13:30 - 14:50 | Domain-Specific TestingTechnical Papers at EI 10 Fritz Paschke Chair(s): Marcelo d'Amorim North Carolina State University | ||
13:30 20mTalk | UPBEAT: Test Input Checks of Q# Quantum Libraries Technical Papers Tianmin Hu Northwest University, Guixin Ye Northwest University, Zhanyong Tang Northwest University, Shin Hwei Tan Concordia University, Huanting Wang University of Leeds, Meng Li Hefei University of Technology, Zheng Wang University of Leeds DOI | ||
13:50 20mTalk | Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement Technical Papers Gwihwan Go Tsinghua University, Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Xiazijian Zou Central South University, Heyuan Shi Central South University, Yu Jiang Tsinghua University DOI | ||
14:10 20mTalk | AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar InferenceACM SIGSOFT Distinguished Paper Award Technical Papers DOI | ||
14:30 20mTalk | Ma11y: A Mutation Framework for Web Accessibility Testing Technical Papers Mahan Tafreshipour University of California at Irvine, Anmol Vilas Deshpande University of California at Irvine, Forough Mehralian University of California at Irvine, Iftekhar Ahmed University of California at Irvine, Sam Malek University of California at Irvine DOI |
13:30 - 14:50 | Vulnerability DetectionTechnical Papers at EI 3 Sahulka Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
13:30 20mTalk | Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph Technical Papers Xiaoyong Yan Zhejiang University, Biao He Ant Group, Wenbo Shen Zhejiang University, Yu Ouyang Ant Group, Kaihang Zhou Zhejiang University, Xingjian Zhang Zhejiang University, Xingyu Wang Zhejiang University, Yukai Cao Zhejiang University, Rui Chang Zhejiang University DOI | ||
13:50 20mTalk | SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection Technical Papers Xin-Cheng Wen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shuzheng Gao Chinese University of Hong Kong, Yang Xiao Chinese Academy of Sciences, Michael Lyu Chinese University of Hong Kong DOI | ||
14:10 20mTalk | CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection Technical Papers Hao Wang Tsinghua University, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Mingyang Sun University of Electronic Science and Technology of China, Yuchen Zhou Beijing University of Technology, Han Qiu Tsinghua University, Xi Xiao Tsinghua University DOI | ||
14:30 20mTalk | Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation Technical Papers Zhaoyang Chu Huazhong University of Science and Technology, Yao Wan Huazhong University of Science and Technology, Qian Li Curtin University, Yang Wu Huazhong University of Science and Technology, Hongyu Zhang Chongqing University, Yulei Sui UNSW, Guandong Xu University of Technology, Hai Jin Huazhong University of Science and Technology DOI Pre-print |
13:30 - 14:50 | Fairness and Safety of Neural NetworksTechnical Papers at EI 7 Chair(s): Jingyi Wang Zhejiang University | ||
13:30 20mTalk | NeuFair: Neural Network Fairness Repair with Dropout Technical Papers Vishnu Asutosh Dasu Pennsylvania State University, Ashish Kumar Pennsylvania State University, Saeid Tizpaz-Niari University of Texas at El Paso, Gang (Gary) Tan Pennsylvania State University DOI | ||
13:50 20mTalk | A Large-Scale Empirical Study on Improving the Fairness of Image Classification Models Technical Papers Junjie Yang College of Intelligence and Computing, Tianjin University, Jiajun Jiang Tianjin University, Zeyu Sun Institute of Software at Chinese Academy of Sciences, Junjie Chen Tianjin University DOI | ||
14:10 20mTalk | Efficient DNN-Powered Software with Fair Sparse Models Technical Papers Xuanqi Gao Xi’an Jiaotong University, Weipeng Jiang Xi’an Jiaotong University, Juan Zhai University of Massachusetts at Amherst, Shiqing Ma University of Massachusetts at Amherst, Xiaoyu Zhang Xi’an Jiaotong University, Chao Shen Xi’an Jiaotong University DOI Pre-print | ||
14:30 20mTalk | Synthesizing Boxes Preconditions for Deep Neural Networks Technical Papers Zengyu Liu National University of Defense Technology, Liqian Chen National University of Defense Technology, Wanwei Liu National University of Defense Technology, Ji Wang National University of Defense Technology DOI |
13:30 - 14:30 | Test GenerationTechnical Papers at EI 9 Hlawka Chair(s): Alessio Gambi Austrian Institute of Technology (AIT) | ||
13:30 20mTalk | Domain Adaptation for Code Model-Based Unit Test Case Generation Technical Papers Jiho Shin York University, Sepehr Hashtroudi University of Calgary, Hadi Hemmati York University, Song Wang York University DOI | ||
13:50 20mTalk | Practitioners’ Expectations on Automated Test Generation Technical Papers Xiao Yu Huawei, Lei Liu Xi’an Jiaotong University, Xing Hu Zhejiang University, Jacky Keung City University of Hong Kong, Xin Xia Huawei, David Lo Singapore Management University DOI | ||
14:10 20mTalk | UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing Technical Papers Yifeng He University of California at Davis, Jiabo Huang Tencent, Yuyang Rong University of California at Davis, Yiwen Guo Unaffiliated, Ethan Wang University of California at Davis, Hao Chen University of California at Davis DOI |
15:00 - 15:30 | |||
15:30 - 16:50 | Empirical StudiesTechnical Papers at EI 10 Fritz Paschke Chair(s): Cristian Cadar Imperial College London | ||
15:30 20mTalk | Bugs in Pods: Understanding Bugs in Container Runtime Systems Technical Papers Jiongchi Yu Singapore Management University, Xiaofei Xie Singapore Management University, Cen Zhang Nanyang Technological University, Sen Chen Tianjin University, Yuekang Li UNSW, Wenbo Shen Zhejiang University DOI | ||
15:50 20mTalk | An Empirical Study on Kubernetes Operator Bugs Technical Papers Qingxin Xu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
16:10 20mTalk | Understanding Misconfigurations in ROS: An Empirical Study and Current Approaches Technical Papers Paulo Canelas Carnegie Mellon University, Bradley Schmerl Carnegie Mellon University, Alcides Fonseca LASIGE; University of Lisbon, Christopher Steven Timperley Carnegie Mellon University DOI Pre-print Media Attached | ||
16:30 20mTalk | An In-Depth Study of Runtime Verification Overheads during Software TestingACM SIGSOFT Distinguished Paper Award Technical Papers DOI |
15:30 - 17:10 | Static Analysis and VerificationTechnical Papers at EI 3 Sahulka Chair(s): Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
15:30 20mTalk | Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace Checking Technical Papers Weilin Luo Sun Yat-sen University, Pingjia Liang Sun Yat-sen University, Junming Qiu Sun Yat-sen University, Polong Chen Sun Yat-sen University, Hai Wan Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Weiyuan Fang Sun Yat-sen University DOI | ||
15:50 20mTalk | Interprocedural Path Complexity Analysis Technical Papers Mira Kaniyur Harvey Mudd College, Ana Cavalcante-Studart Harvey Mudd College, Yihan Yang Harvey Mudd College, Sangeon Park Harvey Mudd College, David Chen Harvey Mudd College, Duy Lam Harvey Mudd College, Lucas Bang Harvey Mudd College DOI | ||
16:10 20mTalk | VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information Extraction Technical Papers Thanh-Dat Nguyen University of Melbourne, Tung Do-Viet Cinnamon AI, Hung Nguyen-Duy Independent Researcher, Tuan-Hai Luu Cinnamon AI, Hung Le Deakin University, Xuan-Bach D. Le University of Melbourne, Patanamon Thongtanunam University of Melbourne DOI Pre-print | ||
16:30 20mTalk | Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks Technical Papers Huaien Zhang Hong Kong Polytechnic University; Southern University of Science and Technology, Yu Pei Hong Kong Polytechnic University, Shuyun Liang Southern University of Science and Technology, Zezhong Xing Southern University of Science and Technology, Shin Hwei Tan Concordia University DOI | ||
16:50 20mTalk | API Misuse Detection via Probabilistic Graphical Model Technical Papers Yunlong Ma Beihang University, Wentong Tian Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University, Li Li Beihang University DOI |
15:30 - 17:10 | |||
15:30 20mTalk | Automated Program Repair via Conversation: Fixing 162 out of 337 Bugs for $0.42 Each using ChatGPT Technical Papers Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
15:50 20mTalk | ThinkRepair: Self-Directed Automated Program Repair Technical Papers Xin Yin Zhejiang University, Chao Ni Zhejiang University, Shaohua Wang Central University of Finance and Economics, Zhenhao Li York University, Limin Zeng Zhejiang University, Xiaohu Yang Zhejiang University DOI | ||
16:10 20mTalk | BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming Assignments Technical Papers Linna Xie Nanjing University, Chongmin Li Nanjing University, Yu Pei Hong Kong Polytechnic University, Tian Zhang Nanjing University, Minxue Pan Nanjing University DOI | ||
16:30 20mTalk | CREF: An LLM-Based Conversational Software Repair Framework for Programming Tutors Technical Papers Boyang Yang Yanshan University; Beijing JudaoYouda Network Technology, Haoye Tian University of Melbourne, Weiguo Pian University of Luxembourg, Haoran Yu Beijing JudaoYouda Network Technology, Haitao Wang Beijing JudaoYouda Network Technology, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Shunfu Jin Yanshan University DOI | ||
16:50 20mTalk | One Size Does Not Fit All: Multi-granularity Patch Generation for Better Automated Program RepairACM SIGSOFT Distinguished Paper Award Technical Papers Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Ming Wen Huazhong University of Science and Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology DOI Pre-print |
15:30 - 17:10 | Testing and Repairing Neural NetworksTechnical Papers at EI 9 Hlawka Chair(s): Mike Papadakis University of Luxembourg | ||
15:30 20mTalk | Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters Technical Papers Purvish Jajal Purdue University, Wenxin Jiang Purdue University, Arav Tewari Purdue University, Erik Kocinare Purdue University, Joseph Woo Purdue University, Anusha Sarraf Purdue University, Yung-Hsiang Lu Purdue University, George K. Thiruvathukal Loyola University Chicago, James C. Davis Purdue University DOI Pre-print | ||
15:50 20mTalk | Interpretability Based Neural Network Repair Technical Papers Zuohui Chen Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Jun Zhou Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Youcheng Sun University of Manchester, Jingyi Wang Zhejiang University, Qi Xuan Zhejiang University of Technology; Binjiang Institute of Artificial Intelligence, Xiaoniu Yang Zhejiang University of Technology; National Key Laboratory of Electromagnetic Space Security DOI | ||
16:10 20mTalk | See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing Technical Papers Yuanyuan Yuan Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Zhendong Su ETH Zurich DOI | ||
16:30 20mTalk | Isolation-Based Debugging for Neural Networks Technical Papers Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Youcheng Sun University of Manchester, Peng Cheng Zhejiang University, Jiming Chen Zhejiang University; Hangzhou Dianzi University DOI | ||
16:50 20mTalk | Certified Continual Learning for Neural Network Regression Technical Papers DOI |
17:45 - 23:00 | BanquetISSTA/ECOOP Social Events at Fuhrgassl-Huber We will take buses from the conference venue to go to the banquet. | ||
Thu 19 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 09:00 | |||
09:00 - 10:00 | |||
09:00 60mKeynote | The Overlooked Steps in Program Analysis: Designing by People for People Keynotes |
10:00 - 10:30 | |||
10:30 - 11:50 | Logging and Field BugsTechnical Papers at EI 10 Fritz Paschke Chair(s): Willem Visser Amazon Web Services | ||
10:30 20mResearch paper | A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We? Technical Papers Zhihan Jiang Chinese University of Hong Kong, Jinyang Liu Chinese University of Hong Kong, Junjie Huang Chinese University of Hong Kong, Yichen LI Chinese University of Hong Kong, Yintong Huo Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Zhuangbin Chen Sun Yat-sen University, Jieming Zhu Huawei Noah’s Ark Lab, Michael Lyu Chinese University of Hong Kong DOI Pre-print | ||
10:50 20mTalk | FastLog: An End-to-End Method to Efficiently Generate and Insert Logging Statements Technical Papers Xiaoyuan Xie Wuhan University, Zhipeng Cai Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Jifeng Xuan Wuhan University DOI | ||
11:10 20mTalk | Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs Technical Papers Shiwen Shan Sun Yat-sen University, Yintong Huo Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Yichen LI Chinese University of Hong Kong, Dan Li Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI | ||
11:30 20mTalk | Foliage: Nourishing Evolving Software by Characterizing and Clustering Field Bugs Technical Papers Zhanyao Lei Shanghai Jiao Tong University, Yixiong Chen Shanghai Jiao Tong University, Mingyuan Xia AppetizerIO, Zhengwei Qi Shanghai Jiao Tong University DOI |
10:30 - 11:50 | BlockchainTechnical Papers at EI 3 Sahulka Chair(s): Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens | ||
10:30 20mTalk | DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3 Technical Papers Zhiying Wu Sun Yat-sen University, Jiajing Wu Sun Yat-sen University, Hui Zhang Sun Yat-sen University, Ziwei Li Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Qing Xia Institute of Software at Chinese Academy of Sciences, Gang Fan Ant Group, Yi Zhen Independent DOI | ||
10:50 20mTalk | LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts Technical Papers Peilin Zheng Sun Yat-sen University, Bowei Su Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China, Neng Zhang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI File Attached | ||
11:10 20mTalk | Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients Technical Papers Shuohan Wu Hong Kong Polytechnic University, Zihao Li Hong Kong Polytechnic University, Hao Zhou Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Jianfeng Li Xi’an Jiaotong University, Haoyu Wang Huazhong University of Science and Technology DOI | ||
11:30 20mTalk | DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications Technical Papers Maoyi Xie Nanyang Technological University, Ming Hu Nanyang Technological University, Ziqiao Kong Nanyang Technological University, Cen Zhang Nanyang Technological University, Yebo Feng Nanyang Technological University, Haijun Wang Xi’an Jiaotong University, Yue Xue MetaTrust Labs, Hao Zhang MetaTrust Labs, Ye Liu Nanyang Technological University, Yang Liu Nanyang Technological University DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Automating Zero-Shot Patch Porting for Hard Forks Technical Papers Shengyi Pan Zhejiang University, You Wang Zhejiang University, Zhongxin Liu Zhejiang University, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University DOI Pre-print | ||
10:50 20mTalk | Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial Bugs Technical Papers Yicheng Ouyang University of Illinois at Urbana-Champaign, Jun Yang University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
11:10 20mTalk | Neurosymbolic Repair of Test Flakiness Technical Papers Yang Chen University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign DOI | ||
11:30 20mTalk | AutoCodeRover: Autonomous Program Improvement Technical Papers Yuntong Zhang National University of Singapore, Haifeng Ruan National University of Singapore, Zhiyu Fan National University of Singapore, Abhik Roychoudhury National University of Singapore DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Distance-Aware Test Input Selection for Deep Neural Networks Technical Papers Zhong Li Nanjing University, Zhengfeng Xu Nanjing University, Ruihua Ji Nanjing University, Minxue Pan Nanjing University, Tian Zhang Nanjing University, Linzhang Wang Nanjing University, Xuandong Li Nanjing University DOI | ||
10:50 20mTalk | Test Selection for Deep Neural Networks using Meta-Models with Uncertainty Metrics Technical Papers Demet Demir Middle East Technical University, Aysu Betin Can Middle East Technical University, Elif Surer Middle East Technical University DOI | ||
11:10 20mTalk | Datactive: Data Fault Localization for Object Detection Systems Technical Papers Yining Yin Nanjing University, Yang Feng Nanjing University, Shihao Weng Nanjing University, Yuan Yao Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing University DOI | ||
11:30 20mTalk | TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development Technical Papers Xiangshan Gao Zhejiang University; Huawei Technology, Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Jie Shi Huawei International, Peng Cheng Zhejiang University, Jiming Chen Zhejiang University; Hangzhou Dianzi University DOI |
12:00 - 13:30 | |||
13:30 - 14:50 | WebAssembly and BrowsersTechnical Papers at EI 10 Fritz Paschke Chair(s): Stefan Brunthaler μCSRL, CODE Research Institute, University of the Bundeswehr Munich | ||
13:30 20mTalk | Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment Technical Papers Jiashui Wang Zhejiang University, Peng Qian Zhejiang University, Xilin Huang Ant Group, Xinlei Ying Ant Group, Yan Chen Northwestern University, Shouling Ji Zhejiang University, Jianhai Chen Zhejiang University, Jundong Xie Ant Group, Long Liu Ant Group DOI | ||
13:50 20mTalk | WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation Technical Papers Shangtong Cao Beijing University of Posts and Telecommunications, Ningyu He Peking University, Xinyu She Huazhong University of Science and Technology, Yixuan Zhang Peking University, Mu Zhang University of Utah, Haoyu Wang Huazhong University of Science and Technology DOI | ||
14:10 20mTalk | Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation Technical Papers DOI |
13:30 - 14:50 | |||
13:30 20mTalk | Testing Gremlin-Based Graph Database Systems via Query Disassembling Technical Papers Yingying Zheng Institute of Software at Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences, Lei Tang Institute of Software at Chinese Academy of Sciences, Ziyu Cui Institute of Software at Chinese Academy of Sciences, Yu Gao Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiansen Song Institute of Software at Chinese Academy of Sciences, Liang Xu Jinling Institute of Technology, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, Wei Wang Institute of Software at Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Hua Zhong Institute of Software at Chinese Academy of Sciences, Tao Huang Institute of Software at Chinese Academy of Sciences DOI | ||
13:50 20mTalk | SQLess: Dialect-Agnostic SQL Query Simplification Technical Papers Li Lin Xiamen University, Zongyin Hao Xiamen University, Chengpeng Wang Hong Kong University of Science and Technology, Zhuangda Wang Xiamen University, Rongxin Wu Xiamen University, Gang Fan Ant Group DOI | ||
14:10 20mTalk | Testing Graph Database Systems with Graph-State Persistence Oracle Technical Papers Shuang Liu Renmin University of China, Junhao Lan Tianjin University, China, Xiaoning Du Monash University, Jiyuan Li Tianjin University, China, Wei Lu Renmin University of China, China, Jiajun Jiang Tianjin University, Xiaoyong Du Renmin University of China DOI |
13:30 - 14:50 | |||
13:30 20mTalk | MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination Indexing Technical Papers Tianyi Yang Chinese University of Hong Kong, Cheryl Lee Chinese University of Hong Kong, Jiacheng Shen Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Cong Feng Huawei Cloud Computing Technology, Yongqiang Yang Huawei Cloud Computing Technology, Michael Lyu Chinese University of Hong Kong DOI | ||
13:50 20mTalk | Feedback-Directed Partial Execution Technical Papers Ishrak Hayet North Carolina State University, Adam Scott North Carolina State University, Marcelo d'Amorim North Carolina State University DOI | ||
14:10 20mTalk | Define-Use Guided Path Exploration for Better Forced Execution Technical Papers Dongnan He Renmin University of China, Dongchen Xie Renmin University of China, Yujie Wang Renmin University of China, Wei You Renmin University of China, Bin Liang Renmin University of China, Jianjun Huang Renmin University of China, Wenchang Shi Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University DOI | ||
14:30 20mTalk | SelfPiCo: Self-Guided Partial Code Execution with LLMs Technical Papers Zhipeng Xue , Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Shaohua Wang Central University of Finance and Economics, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University DOI |
13:30 - 14:50 | Static analysisTechnical Papers at EI 9 Hlawka Chair(s): Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE | ||
13:30 20mTalk | Precise Compositional Buffer Overflow Detection via Heap DisjointnessACM SIGSOFT Distinguished Paper Award Technical Papers Yiyuan Guo Hong Kong University of Science and Technology, Peisen Yao Zhejiang University, Charles Zhang Hong Kong University of Science and Technology DOI Pre-print | ||
13:50 20mTalk | Finding Cuts in Static Analysis Graphs to Debloat Software Technical Papers Christoph Blumschein Hasso Plattner Institute; University of Potsdam, Fabio Niephaus Oracle Labs, Codrut Stancu Oracle Labs, Christian Wimmer Oracle Labs, Jens Lincke Hasso Plattner Institute; University of Potsdam, Robert Hirschfeld Hasso Plattner Institute; University of Potsdam DOI Pre-print | ||
14:10 20mTalk | Scalable, Sound, and Accurate Jump Table Analysis Technical Papers Huan Nguyen Stony Brook University, Soumyakant Priyadarshan Stony Brook University, R. Sekar Stony Brook University DOI | ||
14:30 20mTalk | Better Not Together: Staged Solving for Context-Free Language Reachability Technical Papers Chenghang Shi Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haofeng Li Institute of Computing Technology at Chinese Academy of Sciences, Jie Lu Institute of Computing Technology at Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI Pre-print |
15:00 - 15:30 | |||
15:30 - 17:10 | Vulnerabilities and MalwareTechnical Papers at EI 10 Fritz Paschke Chair(s): Wei You Renmin University of China | ||
15:30 20mTalk | Silent Taint-Style Vulnerability Fixes Identification Technical Papers Zhongzhen Wen Nanjing University, Jiayuan Zhou Huawei, Minxue Pan Nanjing University, Shaohua Wang Central University of Finance and Economics, Xing Hu Zhejiang University, Tongtong Xu Huawei, Tian Zhang Nanjing University, Xuandong Li Nanjing University DOI | ||
15:50 20mTalk | FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor Technical Papers Zhenyu Ye Hunan University, Lei Zhou National University of Defense Technology, Fengwei Zhang Southern University of Science and Technology, Wenqiang Jin Hunan University, Zhenyu Ning Hunan University; Xinchuang Haihe Laboratory, Yupeng Hu Hunan University, Zheng Qin Hunan University DOI | ||
16:10 20mTalk | Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset Technical Papers Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
16:30 20mTalk | PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software Technical Papers Kaixuan Li East China Normal University; Nanyang Technological University, Jian Zhang Nanyang Technological University, Sen Chen Tianjin University, Han Liu East China Normal University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University DOI Pre-print | ||
16:50 20mTalk | An Empirical Study of Static Analysis Tools for Secure Code Review Technical Papers Wachiraphan (Ping) Charoenwet University of Melbourne, Patanamon Thongtanunam University of Melbourne, Thuan Pham University of Melbourne, Christoph Treude Singapore Management University DOI |
15:30 - 16:50 | DebuggingTechnical Papers at EI 3 Sahulka Chair(s): Andreas Zeller CISPA Helmholtz Center for Information Security | ||
15:30 20mTalk | Traceback: A Fault Localization Technique for Molecular Programs Technical Papers Michael C. Gerten Iowa State University, James I. Lathrop Iowa State University, Myra Cohen Iowa State University DOI | ||
15:50 20mTalk | C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging Technical Papers Xuezhi Song Fudan University, Yijian Wu Fudan University, Shuning Liu Fudan University, Bihuan Chen Fudan University, Yun Lin Shanghai Jiao Tong University, Xin Peng Fudan University DOI | ||
16:10 20mTalk | Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-Call Bugs Technical Papers DOI |
15:30 - 17:10 | |||
15:30 20mTalk | One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural Network Technical Papers Di Cui Xidian University, Qiangqiang Wang Xidian University, Yutong Zhao University of Central Missouri, Jiaqi Wang Xidian University, Minjie Wei Xidian University, Jingzhao Hu Xidian University, Luqiao Wang Xidian University, Qingshan Li Xidian University DOI | ||
15:50 20mTalk | CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature Technical Papers Chenyan Liu Shanghai Jiao Tong University; National University of Singapore, Yufan Cai Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yuhuan Huang Shanghai Jiao Tong University, Yunrui Pei Shanghai Jiao Tong University, Bo Jiang Bytedance Network Technology, Ping Yang Bytedance Network Technology, Jin Song Dong National University of Singapore, Hong Mei Shanghai Jiao Tong University DOI | ||
16:10 20mTalk | Arfa: An Agile Regime-Based Floating-Point Optimization Approach for Rounding Errors Technical Papers Jinchen Xu Information Engineering University, Mengqi Cui Information Engineering University, Fei Li Information Engineering University, Zuoyan Zhang Hunan University, Hongru Yang Information Engineering University, Bei Zhou Information Engineering University, Jie Zhao Hunan University DOI | ||
16:30 20mTalk | Automated Deep Learning Optimization via DSL-Based Source Code Transformation Technical Papers Ruixin Wang Purdue University, Minghai Lu Purdue University, Cody Hao Yu BosonAI, Yi-Hsiang Lai Amazon Web Services, Tianyi Zhang Purdue University DOI |
15:30 - 17:10 | Analyzing Neural ModelsTechnical Papers at EI 9 Hlawka Chair(s): Saeid Tizpaz-Niari University of Texas at El Paso | ||
15:30 20mTalk | Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models Technical Papers Mingyi Zhou Monash University, Xiang Gao Beihang University, Pei Liu CSIRO’s Data61, John Grundy Monash University, Chunyang Chen TU Munich, Xiao Chen University of Newcastle, Li Li Beihang University DOI | ||
15:50 20mTalk | Decomposition of Deep Neural Networks into Modules via Mutation Analysis Technical Papers Ali Ghanbari Auburn University DOI | ||
16:10 20mTalk | Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware Prompts Technical Papers Hao Guan University of Queensland; Southern University of Science and Technology, Guangdong Bai University of Queensland, Yepang Liu Southern University of Science and Technology DOI | ||
16:30 20mTalk | DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation Technical Papers Mingke Yang ShanghaiTech University, Yuqi Chen ShanghaiTech University, Yi Liu Nanyang Technological University, Ling Shi Nanyang Technological University DOI | ||
16:50 20mTalk | Evaluating Deep Neural Networks in Deployment: A Comparative Study (Replicability Study) Technical Papers Eduard Pinconschi Carnegie Mellon University, Divya Gopinath KBR; NASA Ames, Rui Abreu INESC-ID; University of Porto, Corina S. Păsăreanu Carnegie Mellon University; NASA Ames DOI |
18:00 - 20:00 | |||
Fri 20 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 09:00 | |||
09:00 - 10:00 | |||
09:00 60mKeynote | Benchmarks and Replicability in Software Engineering Research: Challenges and Opportunities Keynotes |
10:00 - 10:30 | |||
10:30 - 11:50 | |||
10:30 20mTalk | Inconsistencies in TeX-Produced Documents Technical Papers DOI Pre-print | ||
10:50 20mTalk | Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis Technical Papers Chenyao Suo Tianjin University, Junjie Chen Tianjin University, Shuang Liu Renmin University of China, Jiajun Jiang Tianjin University, Yingquan Zhao Tianjin University, Jianrong Wang Tianjin University DOI | ||
11:10 20mTalk | Towards Understanding the Bugs in Solidity Compiler Technical Papers Haoyang Ma Hong Kong University of Science and Technology, Wuqi Zhang Hong Kong University of Science and Technology, Qingchao Shen Tianjin University, Yongqiang Tian Hong Kong University of Science and Technology, Junjie Chen Tianjin University, Shing-Chi Cheung Hong Kong University of Science and Technology DOI | ||
11:30 20mTalk | Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines Technical Papers Gao Cuiying Huazhong University of Science and Technology; JD.com, Yueming Wu Nanyang Technological University, Heng Li Huazhong University of Science and Technology, Wei Yuan Huazhong University of Science and Technology, Haoyu Jiang Huazhong University of Science and Technology, Qidan He JD.com, Yang Liu Nanyang Technological University DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries Technical Papers Hao Xiong Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Qinming Dai Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Rui Chang Zhejiang University, Mingran Qiu Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Renxiang Wang Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Wenbo Shen Zhejiang University, Yajin Zhou Zhejiang University; ZJU-Hangzhou Global Scientific and Technological Innovation Center DOI | ||
10:50 20mTalk | Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps Technical Papers Dingbang Wang University of Connecticut, Yu Zhao University of Cincinnati, Sidong Feng Monash University, Zhaoxu Zhang University of Southern California, William G.J. Halfond University of Southern California, Chunyang Chen TU Munich, Xiaoxia Sun China Mobile (Suzhou) Software Technology, Jiangfan Shi Zhejiang University, Tingting Yu University of Connecticut DOI | ||
11:10 20mTalk | NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps Technical Papers Jikai Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology DOI | ||
11:30 20mTalk | Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes Technical Papers Xiaoyi Yang Rochester Institute of Technology, Yuxing Wang Rochester Institute of Technology, Tahmid Rafi University of Texas at San Antonio, Dongfang Liu Rochester Institute of Technology, Xiaoyin Wang University of Texas at San Antonio, Xueling Zhang Rochester Institute of Technology DOI |
10:30 - 11:50 | |||
10:30 20mTalk | Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization Technical Papers Zhijie Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Liwei Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haolai Wei Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Gang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Meng Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
10:50 20mTalk | FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation Technical Papers Xizhe Yin Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Zixi Liu Nanjing University, Hongwang Liu Nanjing University, Baowen Xu Nanjing University DOI | ||
11:10 20mTalk | DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling Technical Papers Haoran Fang Shanghai Jiao Tong University, Kaikai Zhang Shanghai Jiao Tong University, Donghui Yu Shanghai Jiao Tong University, Yuanyuan Zhang Shanghai Jiao Tong University DOI Pre-print | ||
11:30 20mTalk | Logos: Log Guided Fuzzing for Protocol Implementations Technical Papers Feifan Wu Tsinghua University, Zhengxiong Luo National University of Singapore, Yanyang Zhao Tsinghua University, Qingpeng Du Beijing University of Posts and Telecommunications, Junze Yu Tsinghua University, Ruikang Peng Central South University, Heyuan Shi Central South University, Yu Jiang Tsinghua University DOI |
10:30 - 11:50 | Call Graphs and Static AnalysisTechnical Papers at EI 9 Hlawka Chair(s): Julia Rubin The University of British Columbia | ||
10:30 20mTalk | Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language Features Technical Papers Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Tobias Roth TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Michael Reif CQSE, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE DOI Pre-print | ||
10:50 20mTalk | Total Recall? How Good Are Static Call Graphs Really? Technical Papers Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Anemone Kampkötter TU Dortmund, Johannes Düsing TU Dortmund, Tobias Roth TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Ben Hermann TU Dortmund, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE DOI Pre-print | ||
11:10 20mTalk | Call Graph Soundness in Android Static Analysis Technical Papers Jordan Samhi CISPA Helmholtz Center for Information Security, René Just University of Washington, Tegawendé F. Bissyandé University of Luxembourg, Michael D. Ernst University of Washington, Jacques Klein University of Luxembourg Link to publication DOI Pre-print | ||
11:30 20mTalk | Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT Technical Papers Elvira Albert Complutense University of Madrid, Jesús Correas Complutense University of Madrid, Pablo Gordillo Complutense University of Madrid, Guillermo Román-Díez Universidad Politécnica de Madrid, Albert Rubio Complutense University of Madrid DOI |
12:00 - 13:30 | |||
13:30 - 14:50 | Smart ContractsTechnical Papers at EI 10 Fritz Paschke Chair(s): Michael Pradel University of Stuttgart | ||
13:30 20mTalk | Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis Technical Papers Shuwei Song University of Electronic Science and Technology of China, Jiachi Chen Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Xiapu Luo Hong Kong Polytechnic University, Teng Li University of Electronic Science and Technology of China, Wenwu Yang University of Electronic Science and Technology of China, Leqing Wang University of Electronic Science and Technology of China, Weijie Zhang Jiangsu University of Science and Technology, Feng Luo Hong Kong Polytechnic University, Zheyuan He University of Electronic Science and Technology of China, Yi Lu BitsLab, Pan Li MoveBit DOI | ||
13:50 20mTalk | FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas Fees Technical Papers Yunqi Liu Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI | ||
14:10 20mTalk | Identifying Smart Contract Security Issues in Code Snippets from Stack OverflowACM SIGSOFT Distinguished Paper Award Technical Papers Jiachi Chen Sun Yat-sen University, Chong Chen Sun Yat-sen University, Jiang Hu Sun Yat-sen University, John Grundy Monash University, Yanlin Wang Sun Yat-sen University, Ting Chen University of Electronic Science and Technology of China, Zibin Zheng Sun Yat-sen University DOI Pre-print | ||
14:30 20mTalk | Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis Technical Papers Mingxi Ye Sun Yat-sen University, Xingwei Lin Zhejiang University, Yuhong Nan Sun Yat-sen University, Jiajing Wu Sun Yat-sen University, Zibin Zheng Sun Yat-sen University DOI |
13:30 - 14:50 | |||
13:30 20mTalk | Bridge and Hint: Extending Pre-trained Language Models for Long-Range Code Technical Papers Yujia Chen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Zezhou Yang Harbin Institute of Technology, Hongyu Zhang Chongqing University, Qing Liao Harbin Institute of Technology DOI | ||
13:50 20mTalk | CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding Technical Papers Dong Li Chongqing University, Meng Yan Chongqing University, Yaosheng Zhang Chongqing University, Zhongxin Liu Zhejiang University, Chao Liu Chongqing University, Xiaohong Zhang Chongqing University, Ting Chen University of Electronic Science and Technology of China, David Lo Singapore Management University DOI | ||
14:10 20mTalk | Oracle-Guided Program Selection from Large Language Models Technical Papers Zhiyu Fan National University of Singapore, Haifeng Ruan National University of Singapore, Sergey Mechtaev Peking University, Abhik Roychoudhury National University of Singapore DOI | ||
14:30 20mTalk | How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation Technical Papers Cen Zhang Nanyang Technological University, Yaowen Zheng Nanyang Technological University, Mingqiang Bai Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Ma Nanyang Technological University, Xiaofei Xie Singapore Management University, Yuekang Li UNSW, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University DOI |
13:30 - 14:50 | |||
13:30 20mTalk | Segment-Based Test Case Prioritization: A Multi-objective Approach Technical Papers Hieu Huynh Katalon, Nhu Pham Katalon; Ho Chi Minh City University of Science, Tien N. Nguyen University of Texas at Dallas, Vu Nguyen Katalon; Ho Chi Minh City University of Science; Vietnam National University DOI | ||
13:50 20mTalk | Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable Systems Technical Papers Chuan Luo Beihang University, Shuangyu Lyu Beihang University, Qiyuan Zhao National University of Singapore, Wei Wu Central South University; Xiangjiang Laboratory, Hongyu Zhang Chongqing University, Chunming Hu Beihang University DOI | ||
14:10 20mTalk | Synthesis-Based Enhancement for GUI Test Case Migration Technical Papers Yakun Zhang Peking University, Qihao Zhu DeepSeek-AI, Jiwei Yan Institute of Software at Chinese Academy of Sciences, Chen Liu Peking University, Wenjie Zhang Peking University, Yifan Zhao Peking University, Dan Hao Peking University, Lu Zhang Peking University DOI | ||
14:30 20mTalk | Revisiting Test-Case Prioritization on Long-Running Test Suites Technical Papers Runxiang Cheng University of Illinois at Urbana-Champaign, Shuai Wang University of Illinois at Urbana-Champaign, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign DOI |
15:00 - 15:30 | |||
15:30 - 16:30 | Analysis of Code OriginTechnical Papers at EI 10 Fritz Paschke Chair(s): Darko Marinov University of Illinois at Urbana-Champaign | ||
15:30 20mTalk | Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge Technical Papers Xiaowei Guo Huazhong University of Science and Technology, Cai Fu Huazhong University of Science and Technology, Juan Chen Huazhong University of Science and Technology, Hongle Liu Huazhong University of Science and Technology, Lansheng Han Huazhong University of Science and Technology, Wenjin Li NSFOCUS Technologies Group DOI | ||
15:50 20mTalk | Your “Notice” Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking Technical Papers Kaifeng Huang Tongji University, Yingfeng Xia Fudan University, Bihuan Chen Fudan University, Siyang He Fudan University, Huazheng Zeng Fudan University, Zhuotong Zhou Fudan University, Jin Guo Fudan University, Xin Peng Fudan University DOI | ||
16:10 20mTalk | DeLink: Source File Information Recovery in Binaries Technical Papers Zhe Lang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Xiaohui Chen China Mobile Research Institute, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhanwei Song Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI |
15:30 - 16:30 | |||
15:30 20mTalk | FDI: Attack Neural Code Generation Systems through User Feedback Channel Technical Papers Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Xiapu Luo Hong Kong Polytechnic University, Fu Song Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Nanjing Institute of Software Technology, David Lo Singapore Management University, Li Li Beihang University DOI | ||
15:50 20mTalk | CoderUJB: An Executable and Unified Java Benchmark for Practical Programming Scenarios Technical Papers Zhengran Zeng Peking University, Yidong Wang Peking University, Rui Xie Peking University, Wei Ye Peking University, Shikun Zhang Peking University DOI | ||
16:10 20mTalk | CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision Technical Papers Hao Wang Tsinghua University, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Zihan Sha Information Engineering University, Mingyang Sun University of Electronic Science and Technology of China, Yuchen Zhou Beijing University of Technology, Wenyu Zhu Tsinghua University, Wenju Sun Tsinghua University, Han Qiu Tsinghua University, Xi Xiao Tsinghua University DOI |
15:30 - 16:30 | Builds and TestingTechnical Papers at EI 9 Hlawka Chair(s): Zeyu Sun Institute of Software at Chinese Academy of Sciences | ||
15:30 20mTalk | Enhancing Multi-agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation Technical Papers Xuyan Ma Institute of Software at Chinese Academy of Sciences, Yawen Wang Institute of Software at Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences, Xiaofei Xie Singapore Management University, Boyu Wu Institute of Software at Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences, Fanjiang Xu Institute of Software at Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences DOI | ||
15:50 20mTalk | Commit Artifact Preserving Build Prediction Technical Papers Guoqing Wang Peking University, Zeyu Sun Institute of Software at Chinese Academy of Sciences, Yizhou Chen Peking University, Yifan Zhao Peking University, Qingyuan Liang Peking University, Dan Hao Peking University DOI | ||
16:10 20mTalk | Detecting Build Dependency Errors in Incremental Builds Technical Papers Jun Lyu Nanjing University, Shanshan Li Nanjing University, He Zhang Nanjing University, Yang Zhang Nanjing University, Guoping Rong Nanjing University, Manuel Rigger National University of Singapore DOI |
16:30 - 17:00 | ISSTA 2025 Preview and ClosingKeynotes at EI 7 Chair(s): Maria Christakis TU Wien, Michael Pradel University of Stuttgart | ||
Unscheduled Events
Not scheduled Talk | LLM4Fin: Fully Automating LLM-Powered Test Case Generation for FinTech Software Acceptance Testing Technical Papers Zhiyi Xue East China Normal University, Liangguo Li East China Normal University, Senyue Tian East China Normal University, Xiaohong Chen East China Normal University, Pingping Li Guotai Junan Securities, Liangyu Chen East China Normal University, Tingting Jiang Guotai Junan Securities, Min Zhang East China Normal University DOI | ||
Not scheduled Talk | Multi-modal Learning for WebAssembly Reverse EngineeringACM SIGSOFT Distinguished Paper Award Technical Papers Hanxian Huang University of California at San Diego, Jishen Zhao University of California at San Diego DOI Media Attached | ||
Not scheduled Talk | Evaluating the Effectiveness of Decompilers Technical Papers Ying Cao Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Runze Zhang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Ruigang Liang Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI Media Attached | ||
Not scheduled Talk | DBStorm: Generating Various Effective Workloads for Testing Isolation Levels Technical Papers Keqiang Li East China Normal University, Siyang Weng East China Normal University, Lyu Ni East China Normal University, Chengcheng Yang East China Normal University, Rong Zhang East China Normal University, Xuan Zhou East China Normal University, Aoying Zhou East China Normal University DOI | ||
Not scheduled Talk | Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing Technical Papers Tong Wang Academy of Military Sciences, Taotao Gu Academy of Military Sciences, Huan Deng Academy of Military Sciences, Hu Li Academy of Military Sciences, Xiaohui Kuang Academy of Military Sciences, Gang Zhao Academy of Military Sciences DOI Pre-print Media Attached |
Accepted Papers
Call for Papers
ISSTA invites three kinds of submissions. The majority of submissions is expected to be “Research Papers”, but submissions that best fit the description of “Experience Papers” or “Replicability Studies” should be submitted as such.
Research Papers
Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.
Experience Papers
Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of software testing and analysis methods or tools.
Replicability Studies
ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artifact only, but instead to perform a comparative experiment of multiple related approaches.
In particular, replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): The measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artifacts which they develop completely independently. This means that it is also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:
- Depth and breadth of experiments
- Clarity of writing
- Appropriateness of conclusions
- Amount of useful, actionable insights
- Availability of artifacts
We expect replicability studies to clearly point out the artifacts the study is built on, and to submit those artifacts to the artifact evaluation. Artifacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.
Two Submission Deadlines and Major Revisions
ISSTA 2024 features two submission deadlines. The instructions in this call apply to both deadlines. You can choose to submit at either deadline. Only papers submitted to the first deadline may receive a chance to submit a major revision of the initial submission to the second deadline. Papers submitted to the second deadline will be either accepted or rejected, i.e., there is no option for a major revision.
Papers that are rejected during the first round may not be resubmitted to the second round. Authors who try to bypass this rule (e.g., by changing the paper title without significantly changing paper content, or by making small changes to the paper content) will have their papers desk-rejected without further consideration. Papers rejected from the first or second submission round can, of course, be submitted to ISSTA 2025 without any restrictions.
Submission Guidelines
Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for ISSTA. By submitting an article to an ACM Publication, authors are acknowledging that that all co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of the paper, in addition to other potential penalties, as per ACM Publications Policy.
Research Papers, Experience Papers, and Replicability Studies should be at most 10 pages in length, with at most 2 additional pages for references only. The page limit is strict, i.e., papers that take more than 10 pages for anything apart from references (including any section, figure, text, or appendix), will be desk-rejected. Experience papers and replicability studies should clearly specify their category in the paper title upon submission, e.g., “XXX (Experience Paper)”. All authors should use the official “ACM Master article template”, which can be obtained from the ACM Proceedings Template pages. Latex users should use the “sigconf” option, as well as the “review” (to produce line numbers for easy reference by the reviewers) and “anonymous” (omitting author names) options. To that end, the following Latex code can be placed at the start of the Latex document:
\documentclass[sigconf,review, anonymous]{acmart}
\acmConference[ISSTA 2024]{ACM SIGSOFT International Symposium on Software Testing and Analysis}{16-20 September, 2024}{Vienna, Austria}
Submit your papers via the HotCRP ISSTA 2024 submission website.
Each submission will be reviewed by at least three members of the program committee. Authors will have an opportunity to respond to reviews during a rebuttal period. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation, appropriate comparison to related work, and verifiability/transparency of the work. Some papers may have more than three reviews, as the PC chair may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The authors will have a chance to read the additional reviews and respond to them during the additional short response period. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.
Double-blind Reviewing
ISSTA 2024 will conduct double-blind reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
Authors have the right to upload preprints on arXiv or similar sites, but they must avoid specifying that the paper was submitted to ISSTA.
Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.
Open Science Policy and “Data Availability” Section
ISSTA has adopted an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles, and encourage all contributing authors to disclose data to increase reproducibility and replicability.
Upon submission, authors are asked to make their code, data, etc. available to the program committee, or to comment on why this is not possible or desirable. Data must be shared in an anonymized way (e.g., no information on authors/affiliations in the code) via a site that reveals neither the authors’ nor the reviewers’ identities (e.g., not via Google Drive). At least one of the reviewers will check the provided data. While sharing the data is not mandatory for submission or acceptance, it will inform the program committee’s decision. Furthermore, we ask authors to provide a supporting statement on the data availability (or lack thereof) in their submitted papers in a section named “Data Availability” after the Conclusion section.
Publication Date
The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of your conference. The official publication date affects the deadline for any patent filings related to published work.