


default search action
33rd ISSTA 2024: Vienna, Austria
- Maria Christakis, Michael Pradel:
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2024, Vienna, Austria, September 16-20, 2024. ACM 2024, ISBN 979-8-4007-0612-7
Papers Round 1
- Jun Lyu
, Shanshan Li
, He Zhang
, Yang Zhang
, Guoping Rong
, Manuel Rigger
:
Detecting Build Dependency Errors in Incremental Builds. 1-12 - Shiwen Shan
, Yintong Huo
, Yuxin Su
, Yichen Li
, Dan Li
, Zibin Zheng
:
Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs. 13-25 - Xiaoyuan Xie
, Zhipeng Cai
, Songqiang Chen
, Jifeng Xuan
:
FastLog: An End-to-End Method to Efficiently Generate and Insert Logging Statements. 26-37 - Zhenyu Ye
, Lei Zhou
, Fengwei Zhang
, Wenqiang Jin
, Zhenyu Ning
, Yupeng Hu
, Zheng Qin
:
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor. 38-50 - Dominik Helm
, Tobias Roth
, Sven Keidel
, Michael Reif
, Mira Mezini
:
Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language Features. 51-62 - Yiyuan Guo
, Peisen Yao
, Charles Zhang
:
Precise Compositional Buffer Overflow Detection via Heap Disjointness. 63-75 - Yuheng Shen
, Jianzhong Liu
, Yiru Xu
, Hao Sun
, Mingzhe Wang
, Nan Guan
, Heyuan Shi
, Yu Jiang
:
Enhancing ROS System Fuzzing through Callback Tracing. 76-87 - Yunlong Ma
, Wentong Tian
, Xiang Gao
, Hailong Sun
, Li Li
:
API Misuse Detection via Probabilistic Graphical Model. 88-99 - Mahan Tafreshipour
, Anmol Deshpande
, Forough Mehralian
, Iftekhar Ahmed
, Sam Malek
:
Ma11y: A Mutation Framework for Web Accessibility Testing. 100-111 - Dominik Helm
, Sven Keidel
, Anemone Kampkötter
, Johannes Düsing
, Tobias Roth
, Ben Hermann
, Mira Mezini
:
Total Recall? How Good Are Static Call Graphs Really? 112-123 - Zhengran Zeng
, Yidong Wang
, Rui Xie
, Wei Ye
, Shikun Zhang
:
CoderUJB: An Executable and Unified Java Benchmark for Practical Programming Scenarios. 124-136 - Zhiying Wu
, Jiajing Wu
, Hui Zhang
, Ziwei Li
, Jiachi Chen
, Zibin Zheng
, Qing Xia
, Gang Fan
, Yi Zhen
:
DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3. 137-148 - Hao Wang
, Zeyu Gao
, Chao Zhang
, Mingyang Sun
, Yuchen Zhou
, Han Qiu
, Xi Xiao
:
CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection. 149-161 - Mira Bhagirathi Kaniyur
, Ana Cavalcante-Studart
, Yihan Yang
, Sangeon Park
, David Chen
, Duy Lam
, Lucas Bang
:
Interprocedural Path Complexity Analysis. 162-173 - Mingyi Zhou
, Xiang Gao
, Pei Liu
, John Grundy
, Chunyang Chen
, Xiao Chen
, Li Li
:
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models. 174-185 - Tianmin Hu
, Guixin Ye
, Zhanyong Tang
, Shin Hwei Tan
, Huanting Wang
, Meng Li
, Zheng Wang
:
UPBEAT: Test Input Checks of Q# Quantum Libraries. 186-198 - Xiaowei Guo
, Cai Fu
, Juan Chen
, Hongle Liu
, Lansheng Han
, Wenjin Li
:
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge. 199-209 - Junjie Yang
, Jiajun Jiang
, Zeyu Sun
, Junjie Chen
:
A Large-Scale Empirical Study on Improving the Fairness of Image Classification Models. 210-222 - Zhihan Jiang
, Jinyang Liu
, Junjie Huang
, Yichen Li
, Yintong Huo
, Jiazhen Gu
, Zhuangbin Chen
, Jieming Zhu
, Michael R. Lyu
:
A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We? 223-234 - Xin-Cheng Wen
, Cuiyun Gao
, Shuzheng Gao
, Yang Xiao
, Michael R. Lyu
:
SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection. 235-247 - Zhong Li
, Zhengfeng Xu
, Ruihua Ji
, Minxue Pan
, Tian Zhang
, Linzhang Wang
, Xuandong Li
:
Distance-Aware Test Input Selection for Deep Neural Networks. 248-260 - Mengxiao Zhang
, Yongqiang Tian
, Zhenyang Xu
, Yiwen Dong
, Shin Hwei Tan
, Chengnian Sun
:
LPR: Large Language Models-Aided Program Reduction. 261-273 - Yujia Chen
, Cuiyun Gao
, Zezhou Yang
, Hongyu Zhang
, Qing Liao
:
Bridge and Hint: Extending Pre-trained Language Models for Long-Range Code. 274-286 - Dongnan He
, Dongchen Xie
, Yujie Wang
, Wei You
, Bin Liang
, Jianjun Huang
, Wenchang Shi
, Zhuo Zhang
, Xiangyu Zhang
:
Define-Use Guided Path Exploration for Better Forced Execution. 287-299 - Xuezhi Song
, Yijian Wu
, Shuning Liu
, Bihuan Chen
, Yun Lin
, Xin Peng
:
C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging. 300-312 - Qi Guo
, Xiaohong Li
, Xiaofei Xie
, Shangqing Liu
, Ze Tang
, Ruitao Feng
, Junjie Wang
, Jidong Ge
, Lei Bu
:
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion. 313-324 - Tianyi Yang
, Cheryl Lee, Jiacheng Shen
, Yuxin Su
, Cong Feng
, Yongqiang Yang
, Michael R. Lyu
:
MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination Indexing. 325-337 - Jialuo Chen
, Jingyi Wang
, Youcheng Sun
, Peng Cheng
, Jiming Chen
:
Isolation-Based Debugging for Neural Networks. 338-349 - Hao Xiong
, Qinming Dai
, Rui Chang
, Mingran Qiu
, Renxiang Wang
, Wenbo Shen
, Yajin Zhou
:
Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries. 350-362 - Shengyi Pan
, You Wang
, Zhongxin Liu
, Xing Hu
, Xin Xia
, Shanping Li
:
Automating Zero-Shot Patch Porting for Hard Forks. 363-375 - You Lu
, Yifan Tian
, Yuyang Bi
, Bihuan Chen
, Xin Peng
:
DiaVio: LLM-Empowered Diagnosis of Safety Violations in ADS Simulation Testing. 376-388 - Zhaoyang Chu
, Yao Wan
, Qian Li
, Yang Wu
, Hongyu Zhang
, Yulei Sui
, Guandong Xu
, Hai Jin
:
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation. 389-401 - Maoyi Xie
, Ming Hu
, Ziqiao Kong
, Cen Zhang
, Yebo Feng
, Haijun Wang
, Yue Xue
, Hao Zhang
, Ye Liu
, Yang Liu
:
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications. 402-414 - Michael C. Gerten
, James I. Lathrop
, Myra B. Cohen
:
Traceback: A Fault Localization Technique for Molecular Programs. 415-427 - Zhongzhen Wen
, Jiayuan Zhou
, Minxue Pan
, Shaohua Wang
, Xing Hu
, Tongtong Xu
, Tian Zhang
, Xuandong Li
:
Silent Taint-Style Vulnerability Fixes Identification. 428-439 - Yicheng Ouyang
, Jun Yang
, Lingming Zhang
:
Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial Bugs. 440-452 - Hanxian Huang
, Jishen Zhao
:
Multi-modal Learning for WebAssembly Reverse Engineering. 453-465 - Chenyan Liu
, Yufan Cai
, Yun Lin
, Yuhuan Huang
, Yunrui Pei
, Bo Jiang
, Ping Yang
, Jin Song Dong
, Hong Mei
:
CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature. 466-478 - Ruixin Wang
, Minghai Lu
, Cody Hao Yu
, Yi-Hsiang Lai
, Tianyi Zhang
:
Automated Deep Learning Optimization via DSL-Based Source Code Transformation. 479-490 - Ying Cao
, Runze Zhang
, Ruigang Liang
, Kai Chen
:
Evaluating the Effectiveness of Decompilers. 491-502 - Hao Wang
, Zeyu Gao
, Chao Zhang
, Zihan Sha
, Mingyang Sun
, Yuchen Zhou
, Wenyu Zhu
, Wenju Sun
, Han Qiu
, Xi Xiao
:
CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision. 503-515 - Yunqi Liu
, Wei Song
:
FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas Fees. 516-527
Papers Round 2
- Zhensu Sun
, Xiaoning Du
, Xiapu Luo
, Fu Song
, David Lo
, Li Li
:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. 528-540 - Huan Nguyen
, Soumyakant Priyadarshan
, R. Sekar
:
Scalable, Sound, and Accurate Jump Table Analysis. 541-552 - Cuiying Gao
, Yueming Wu
, Heng Li
, Wei Yuan
, Haoyu Jiang
, Qidan He
, Yang Liu
:
Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines. 553-565 - Peilin Zheng
, Bowei Su
, Xiapu Luo
, Ting Chen
, Neng Zhang
, Zibin Zheng
:
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts. 566-577 - Mingke Yang
, Yuqi Chen
, Yi Liu
, Ling Shi
:
DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation. 578-589 - Kaixuan Li
, Jian Zhang
, Sen Chen
, Han Liu
, Yang Liu
, Yixiang Chen
:
PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software. 590-602 - Christoph Blumschein
, Fabio Niephaus
, Codrut Stancu
, Christian Wimmer
, Jens Lincke
, Robert Hirschfeld
:
Finding Cuts in Static Analysis Graphs to Debloat Software. 603-614 - Runxiang Cheng
, Shuai Wang
, Reyhaneh Jabbarvand
, Darko Marinov
:
Revisiting Test-Case Prioritization on Long-Running Test Suites. 615-627 - Zhiyu Fan
, Haifeng Ruan
, Sergey Mechtaev
, Abhik Roychoudhury
:
Oracle-Guided Program Selection from Large Language Models. 628-640 - Chuan Luo
, Shuangyu Lyu
, Qiyuan Zhao
, Wei Wu
, Hongyu Zhang
, Chunming Hu
:
Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable Systems. 641-653 - Benjamin Kushigian
, Samuel J. Kaufman
, Ryan Featherman
, Hannah Potter
, Ardi Madadi
, René Just
:
Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java Programs. 654-665 - Shuang Liu
, Junhao Lan
, Xiaoning Du
, Jiyuan Li
, Wei Lu
, Jiajun Jiang
, Xiaoyong Du
:
Testing Graph Database Systems with Graph-State Persistence Oracle. 666-677 - Demet Demir
, Aysu Betin Can
, Elif Sürer
:
Test Selection for Deep Neural Networks using Meta-Models with Uncertainty Metrics. 678-690 - Wachiraphan Charoenwet
, Patanamon Thongtanunam
, Van-Thuan Pham
, Christoph Treude
:
An Empirical Study of Static Analysis Tools for Secure Code Review. 691-703 - Thanh-Dat Nguyen
, Tung Do-Viet
, Hung Nguyen-Duy
, Tuan-Hai Luu
, Hung Le
, Bach Le
, Patanamon Thongtanunam
:
VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information Extraction. 704-716 - Xiaoyi Yang, Yuxing Wang, Tahmid Rafi, Dongfang Liu, Xiaoyin Wang, Xueling Zhang:
Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes. 717-729 - Haolai Wei
, Liwei Chen
, Zhijie Zhang
, Gang Shi
, Dan Meng
:
Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC. 730-742 - Li Lin
, Zongyin Hao
, Chengpeng Wang
, Zhuangda Wang
, Rongxin Wu
, Gang Fan
:
SQLess: Dialect-Agnostic SQL Query Simplification. 743-754 - Keqiang Li
, Siyang Weng
, Lyu Ni
, Chengcheng Yang
, Rong Zhang
, Xuan Zhou
, Aoying Zhou
:
DBStorm: Generating Various Effective Workloads for Testing Isolation Levels. 755-767 - Arooba Shahoor
, Jooyong Yi
, Dongsun Kim
:
Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-Call Bugs. 768-780 - Ishrak Hayet
, Adam Scott
, Marcelo d'Amorim
:
Feedback-Directed Partial Execution. 781-793 - Mingxi Ye
, Xingwei Lin
, Yuhong Nan
, Jiajing Wu
, Zibin Zheng
:
Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis. 794-805 - Long H. Pham
, Jun Sun
:
Certified Continual Learning for Neural Network Regression. 806-818 - Chunqiu Steven Xia
, Lingming Zhang
:
Automated Program Repair via Conversation: Fixing 162 out of 337 Bugs for $0.42 Each using ChatGPT. 819-831 - Haoran Fang
, Kaikai Zhang
, Donghui Yu
, Yuanyuan Zhang
:
DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling. 832-843 - Zhongrui Li
, Jiarun Dai
, Zongan Huang
, Nianhao You
, Yuan Zhang
, Min Yang
:
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing. 844-855 - Linna Xie
, Chongmin Li
, Yu Pei
, Tian Zhang
, Minxue Pan
:
BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming Assignments. 856-868 - Yakun Zhang
, Qihao Zhu
, Jiwei Yan
, Chen Liu
, Wenjie Zhang
, Yifan Zhao
, Dan Hao
, Lu Zhang
:
Synthesis-Based Enhancement for GUI Test Case Migration. 869-881 - Boyang Yang
, Haoye Tian
, Weiguo Pian
, Haoran Yu
, Haitao Wang
, Jacques Klein
, Tegawendé F. Bissyandé
, Shunfu Jin
:
CREF: An LLM-Based Conversational Software Repair Framework for Programming Tutors. 882-894 - Yining Yin
, Yang Feng
, Shihao Weng
, Yuan Yao
, Jia Liu
, Zhihong Zhao
:
Datactive: Data Fault Localization for Object Detection Systems. 895-907 - Zuohui Chen
, Jun Zhou
, Youcheng Sun
, Jingyi Wang
, Qi Xuan
, Xiaoniu Yang
:
Interpretability Based Neural Network Repair. 908-919 - Paul-Antoine Le Tolguenec
, Emmanuel Rachelson
, Yann Besse
, Florent Teichteil-Königsbuch
, Nicolas Schneider
, Hélène Waeselynck
, Dennis Wilson
:
Exploration-Driven Reinforcement Learning for Avionic System Fault Detection (Experience Paper). 920-931 - Parsa Alian
, Noor Nashid
, Mobina Shahbandeh
, Ali Mesbah
:
Semantic Constraint Inference for Web Form Test Generation. 932-944 - Jordan Samhi
, René Just
, Tegawendé F. Bissyandé
, Michael D. Ernst
, Jacques Klein
:
Call Graph Soundness in Android Static Analysis. 945-957 - Dezhi Ran
, Hao Wang
, Zihe Song
, Mengzhou Wu
, Yuan Cao
, Ying Zhang
, Wei Yang
, Tao Xie
:
Guardian: A Runtime Framework for LLM-Based UI Exploration. 958-970 - Jikai Wang
, Haoyu Wang
:
NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps. 971-982 - Xuanqi Gao
, Weipeng Jiang
, Juan Zhai
, Shiqing Ma
, Xiaoyu Zhang
, Chao Shen
:
Efficient DNN-Powered Software with Fair Sparse Models. 983-995 - Weilin Luo
, Pingjia Liang
, Junming Qiu
, Polong Chen
, Hai Wan
, Jianfeng Du
, Weiyuan Fang
:
Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace Checking. 996-1008 - Zhe Lang
, Zhengzi Xu
, Xiaohui Chen
, Shichao Lv
, Zhanwei Song
, Zhiqiang Shi
, Limin Sun
:
DeLink: Source File Information Recovery in Binaries. 1009-1021 - Kaifeng Huang
, Yingfeng Xia
, Bihuan Chen
, Siyang He
, Huazheng Zeng
, Zhuotong Zhou
, Jin Guo
, Xin Peng
:
Your "Notice" Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking. 1022-1034 - Wenxuan Zhao
, Ruiying Zeng
, Yangfan Zhou
:
Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation. 1035-1047 - Dingbang Wang
, Yu Zhao
, Sidong Feng
, Zhaoxu Zhang
, William G. J. Halfond
, Chunyang Chen
, Xiaoxia Sun
, Jiangfan Shi
, Tingting Yu
:
Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps. 1048-1060 - Yifeng He
, Jiabo Huang
, Yuyang Rong
, Yiwen Guo
, Ethan Wang
, Hao Chen
:
UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing. 1061-1072 - Lianghong Guo
, Yanlin Wang
, Ensheng Shi
, Wanjun Zhong
, Hongyu Zhang
, Jiachi Chen
, Ruikai Zhang
, Yuchi Ma
, Zibin Zheng
:
When to Stop? Towards Efficient Code Generation in LLMs with Excess Token Prevention. 1073-1085 - Tong Wang
, Taotao Gu
, Huan Deng
, Hu Li
, Xiaohui Kuang
, Gang Zhao
:
Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing. 1086-1098 - Hyungseok Kim
, Soomin Kim
, Jungwoo Lee
, Sang Kil Cha
:
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference. 1099-1111 - Chenghang Shi
, Haofeng Li
, Jie Lu
, Lian Li
:
Better Not Together: Staged Solving for Context-Free Language Reachability. 1112-1123 - Zhensu Sun
, Xiaoning Du
, Zhou Yang
, Li Li
, David Lo
:
AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code Generation. 1124-1136 - Xizhe Yin
, Yang Feng
, Qingkai Shi
, Zixi Liu
, Hongwang Liu
, Baowen Xu
:
FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation. 1137-1148 - Hieu Huynh
, Nhu Pham
, Tien N. Nguyen
, Vu Nguyen
:
Segment-Based Test Case Prioritization: A Multi-objective Approach. 1149-1160 - Paulo Canelas
, Bradley R. Schmerl
, Alcides Fonseca
, Christopher Steven Timperley
:
Understanding Misconfigurations in ROS: An Empirical Study and Current Approaches. 1161-1173 - Jiashui Wang
, Peng Qian
, Xilin Huang
, Xinlei Ying
, Yan Chen
, Shouling Ji
, Jianhai Chen
, Jundong Xie
, Long Liu
:
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. 1174-1185 - Elvira Albert
, Jesús Correas
, Pablo Gordillo
, Guillermo Román-Díez
, Albert Rubio
:
Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT. 1186-1197 - Jiachi Chen
, Chong Chen
, Jiang Hu
, John C. Grundy
, Yanlin Wang
, Ting Chen
, Zibin Zheng
:
Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow. 1198-1210 - Jiho Shin
, Sepehr Hashtroudi
, Hadi Hemmati
, Song Wang
:
Domain Adaptation for Code Model-Based Unit Test Case Generation. 1211-1222 - Cen Zhang
, Yaowen Zheng
, Mingqiang Bai
, Yeting Li
, Wei Ma
, Xiaofei Xie
, Yuekang Li
, Limin Sun
, Yang Liu
:
How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation. 1223-1235 - Guoqing Wang
, Zeyu Sun
, Yizhou Chen
, Yifan Zhao
, Qingyuan Liang
, Dan Hao
:
Commit Artifact Preserving Build Prediction. 1236-1248 - Antu Saha
, Yang Song
, Junayed Mahmud
, Ying Zhou
, Kevin Moran
, Oscar Chaparro
:
Toward the Automated Localization of Buggy Mobile App UIs from Bug Descriptions. 1249-1261 - Shangtong Cao
, Ningyu He
, Xinyu She
, Yixuan Zhang
, Mu Zhang
, Haoyu Wang
:
WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation. 1262-1273 - Xin Yin
, Chao Ni
, Shaohua Wang
, Zhenhao Li
, Limin Zeng
, Xiaohu Yang
:
ThinkRepair: Self-Directed Automated Program Repair. 1274-1286 - Chenyao Suo
, Junjie Chen
, Shuang Liu
, Jiajun Jiang
, Yingquan Zhao
, Jianrong Wang
:
Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis. 1287-1299 - Eduard Pinconschi
, Divya Gopinath
, Rui Abreu
, Corina S. Pasareanu
:
Evaluating Deep Neural Networks in Deployment: A Comparative Study (Replicability Study). 1300-1311 - Haoyang Ma
, Wuqi Zhang
, Qingchao Shen
, Yongqiang Tian
, Junjie Chen
, Shing-Chi Cheung
:
Towards Understanding the Bugs in Solidity Compiler. 1312-1324 - Zhanyao Lei
, Yixiong Chen
, Mingyuan Xia
, Zhengwei Qi
:
Foliage: Nourishing Evolving Software by Characterizing and Clustering Field Bugs. 1325-1337 - Gwihwan Go
, Chijin Zhou
, Quan Zhang
, Xiazijian Zou
, Heyuan Shi
, Yu Jiang
:
Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement. 1338-1350 - Zhijie Zhang
, Liwei Chen
, Haolai Wei
, Gang Shi
, Dan Meng
:
Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization. 1351-1363 - Jiongchi Yu
, Xiaofei Xie
, Cen Zhang
, Sen Chen
, Yuekang Li
, Wenbo Shen
:
Bugs in Pods: Understanding Bugs in Container Runtime Systems. 1364-1376 - Xiaoyong Yan
, Biao He
, Wenbo Shen
, Yu Ouyang
, Kaihang Zhou
, Xingjian Zhang
, Xingyu Wang
, Yukai Cao
, Rui Chang
:
Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph. 1377-1388 - Zhipeng Xue
, Zhipeng Gao
, Shaohua Wang
, Xing Hu
, Xin Xia
, Shanping Li
:
SelfPiCo: Self-Guided Partial Code Execution with LLMs. 1389-1401 - Yang Chen
, Reyhaneh Jabbarvand
:
Neurosymbolic Repair of Test Flakiness. 1402-1414 - Jovyn Tan
, Manuel Rigger
:
Inconsistencies in TeX-Produced Documents. 1415-1427 - Dong Li
, Meng Yan
, Yaosheng Zhang
, Zhongxin Liu
, Chao Liu
, Xiaohong Zhang
, Ting Chen
, David Lo
:
CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding. 1428-1439 - Shuohan Wu
, Zihao Li
, Hao Zhou
, Xiapu Luo
, Jianfeng Li
, Haoyu Wang
:
Following the "Thread": Toward Finding Manipulatable Bottlenecks in Blockchain Clients. 1440-1452 - An Guo
, Xinyu Gao
, Zhenyu Chen
, Yuan Xiao
, Jiakai Liu
, Xiuting Ge
, Weisong Sun
, Chunrong Fang
:
CooTest: An Automated Testing Approach for V2X Communication Systems. 1453-1465 - Purvish Jajal
, Wenxin Jiang
, Arav Tewari
, Erik Kocinare
, Joseph Woo
, Anusha Sarraf
, Yung-Hsiang Lu
, George K. Thiruvathukal
, James C. Davis
:
Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters. 1466-1478 - Xiangshan Gao
, Jialuo Chen
, Jingyi Wang
, Jie Shi
, Peng Cheng
, Jiming Chen
:
TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development. 1479-1490 - Xuyan Ma
, Yawen Wang
, Junjie Wang
, Xiaofei Xie
, Boyu Wu
, Shoubin Li
, Fanjiang Xu
, Qing Wang
:
Enhancing Multi-agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation. 1491-1503 - Xiaobao Cai
, Zhen Dong
, Yongjiang Wang
, Abhishek Tiwari
, Xin Peng
:
Reproducing Timing-Dependent GUI Flaky Tests in Android Apps via a Single Event Delay. 1504-1515 - Jinchen Xu
, Mengqi Cui
, Fei Li
, Zuoyan Zhang
, Hongru Yang
, Bei Zhou
, Jie Zhao
:
Arfa: An Agile Regime-Based Floating-Point Optimization Approach for Rounding Errors. 1516-1528 - Di Cui
, Qiangqiang Wang
, Yutong Zhao
, Jiaqi Wang
, Minjie Wei
, Jingzhao Hu
, Luqiao Wang
, Qingshan Li
:
One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural Network. 1529-1540 - Vishnu Asutosh Dasu
, Ashish Kumar
, Saeid Tizpaz-Niari
, Gang Tan
:
NeuFair: Neural Network Fairness Repair with Dropout. 1541-1553 - Bo Lin
, Shangwen Wang
, Ming Wen
, Liqian Chen
, Xiaoguang Mao
:
One Size Does Not Fit All: Multi-granularity Patch Generation for Better Automated Program Repair. 1554-1566 - Quentin Mazouni
, Helge Spieker
, Arnaud Gotlieb
, Mathieu Acher
:
Policy Testing with MDPFuzz (Replicability Study). 1567-1578 - Hao Guan
, Guangdong Bai
, Yepang Liu
:
Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware Prompts. 1579-1591 - Yuntong Zhang
, Haifeng Ruan
, Zhiyu Fan
, Abhik Roychoudhury
:
AutoCodeRover: Autonomous Program Improvement. 1592-1604 - Yuanyuan Yuan
, Shuai Wang
, Zhendong Su
:
See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing. 1605-1617 - Xiao Yu
, Lei Liu
, Xing Hu
, Jacky Keung
, Xin Xia
, David Lo
:
Practitioners' Expectations on Automated Test Generation. 1618-1630 - James Kukucka
, Luís Pina
, Paul Ammann
, Jonathan Bell
:
An Empirical Examination of Fuzzer Mutator Performance. 1631-1642 - Zhiyi Xue
, Liangguo Li
, Senyue Tian
, Xiaohong Chen
, Pingping Li
, Liangyu Chen
, Tingting Jiang
, Min Zhang
:
LLM4Fin: Fully Automating LLM-Powered Test Case Generation for FinTech Software Acceptance Testing. 1643-1655 - Jueon Eom
, Seyeon Jeong
, Taekyoung Kwon
:
Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation. 1656-1668 - Ali Ghanbari
:
Decomposition of Deep Neural Networks into Modules via Mutation Analysis. 1669-1681 - Shuwei Song
, Jiachi Chen
, Ting Chen
, Xiapu Luo
, Teng Li
, Wenwu Yang
, Leqing Wang
, Weijie Zhang
, Feng Luo
, Zheyuan He
, Yi Lu
, Pan Li
:
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis. 1682-1694 - Yingying Zheng
, Wensheng Dou
, Lei Tang
, Ziyu Cui
, Yu Gao
, Jiansen Song
, Liang Xu
, Jiaxin Zhu
, Wei Wang
, Jun Wei
, Hua Zhong
, Tao Huang
:
Testing Gremlin-Based Graph Database Systems via Query Disassembling. 1695-1707 - Zengyu Liu
, Liqian Chen
, Wanwei Liu
, Ji Wang
:
Synthesizing Boxes Preconditions for Deep Neural Networks. 1708-1719 - Feifan Wu
, Zhengxiong Luo
, Yanyang Zhao
, Qingpeng Du
, Junze Yu
, Ruikang Peng
, Heyuan Shi
, Yu Jiang
:
Logos: Log Guided Fuzzing for Protocol Implementations. 1720-1732 - Zhao Tian
, Honglin Shu
, Dong Wang
, Xuejie Cao
, Yasutaka Kamei
, Junjie Chen
:
Large Language Models for Equivalent Mutant Detection: How Far Are We? 1733-1745 - Qingxin Xu
, Yu Gao
, Jun Wei
:
An Empirical Study on Kubernetes Operator Bugs. 1746-1758 - Zeliang Yu
, Ming Wen
, Xiaochen Guo
, Hai Jin
:
Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset. 1759-1771 - Huaien Zhang
, Yu Pei
, Shuyun Liang
, Zezhong Xing
, Shin Hwei Tan
:
Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks. 1772-1784 - Yuxin Qiu
, Jie Hu
, Qian Zhang
, Heng Yin
:
Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks. 1785-1797 - Kevin Guan
, Owolabi Legunsen
:
An In-Depth Study of Runtime Verification Overheads during Software Testing. 1798-1810
ISSTA/ECOOP Tool Demonstrations
- Alessio Gambi
, Shreya Mathews
, Benedikt Steininger
, Mykhailo Poienko
, David Bobek
:
The Flexcrash Platform for Testing Autonomous Vehicles in Mixed-Traffic Scenarios. 1811-1815 - Ningyu He
, Zhehao Zhao
, Hanqin Guan
, Jikai Wang
, Shuo Peng
, Ding Li
, Haoyu Wang
, Xiangqun Chen
, Yao Guo
:
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries. 1816-1820 - Aleksandr Potapov
, Maksim Zuev
, Evgenii Moiseenko
, Nikita Koval
:
Testing Concurrent Algorithms on JVM with Lincheck and IntelliJ IDEA. 1821-1825 - Baoquan Cui
, Jiwei Yan
, Jian Zhang
:
DMMPP: Constructing Dummy Main Methods for Android Apps with Path-Sensitive Predicates. 1826-1830 - Zaiyu Cheng
, Tong Wu
, Peter Schrammel
, Norbert Tihanyi
, Eddie B. de Lima Filho
, Lucas C. Cordeiro
:
JCWIT: A Correctness-Witness Validator for Java Programs Based on Bounded Model Checking. 1831-1835 - Bruno Farias
, Rafael Menezes
, Eddie B. de Lima Filho
, Youcheng Sun
, Lucas C. Cordeiro
:
ESBMC-Python: A Bounded Model Checker for Python Programs. 1836-1840 - Evan Sultanik
, Marek Surovic
, Henrik Brodin
, Kelly Kaoudis
, Facundo Tuesca
, Carson Harmon
, Lisa Overall
, Joseph Sweeney
, Bradford Larsen
:
PolyTracker: Whole-Input Dynamic Information Flow Tracing. 1841-1845 - Pedro Tavares
, Ana C. R. Paiva, Domenico Amalfitano
, René Just
:
FRAFOL: FRAmework FOr Learning mutation testing. 1846-1850 - Luqiao Wang
, Qiangqiang Wang
, Jiaqi Wang
, Yutong Zhao
, Minjie Wei
, Zhou Quan
, Di Cui
, Qingshan Li
:
HECS: A Hypergraph Learning-Based System for Detecting Extract Class Refactoring Opportunities. 1851-1855 - Facundo Molina
, Juan Manuel Copia
, Alessandra Gorla
:
FixCheck: A Tool for Improving Patch Correctness Analysis. 1856-1860 - Ege Berkay Gulcan
, João Neto
, Burcu Kulahcioglu Ozkan
:
Generalized Concurrency Testing Tool for Distributed Systems. 1861-1865 - Paul Fiterau-Brostean
, Bengt Jonsson
, Konstantinos Sagonas
, Fredrik Tåquist
:
SMBugFinder: An Automated Framework for Testing Protocol Implementations for State Machine Bugs. 1866-1870 - Xutong Ma
, Jiwei Yan
, Jun Yan
, Jian Zhang
:
Panda: A Concurrent Scheduler for Compiler-Based Tools. 1871-1875 - Yunqi Liu
, Wei Song
:
FunRedisp: A Function Redispatch Tool to Reduce Invocation Gas Fees in Solidity Smart Contracts. 1876-1880
Late PhD Papers
- Roy Margalit
:
Robustness against the C/C++11 Memory Model. 1881-1885 - Laura Plein
:
Learning the Effects of Software Changes. 1886-1890 - Bram Vandenbogaerde
:
Soft Verification for Actor Contract Systems. 1891-1895 - Drishti Yadav
:
From Fault Injection to Formal Verification: A Holistic Approach to Fault Diagnosis in Cyber-Physical Systems. 1896-1900 - José Antonio Zamudio Amaya
:
Shaping Test Inputs in Grammar-Based Fuzzing. 1901-1905
Early PhD Papers
- Alix Decrop
:
Leveraging Natural Language Processing and Data Mining to Augment and Validate APIs. 1906-1908 - Leon Freudenthaler
:
Decentralized Near-Synchronous Local-First Programming Collaboration. 1909-1911 - Kerstin Jacob
:
Integrating Mutation Techniques to Keep Specification and Source Code in Sync. 1912-1914 - Nimantha Kariyakarawana
:
Quality Assurance for Non-trivial Systems: Use Case GCC Plugins. 1915-1916 - Jie Qiu
:
Search-Based Translations for Tensor Operations. 1917-1919 - Michal Rozsíval
:
Automated Testing of Networked Systems Reliability. 1920-1922 - Luqiao Wang
:
Graph Learning for Extract Class Refactoring. 1923-1925 - Xin-Cheng Wen
:
Collaboration to Repository-Level Vulnerability Detection. 1926-1928

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.