


default search action
33rd ISSTA 2024: Vienna, Austria
- Maria Christakis, Michael Pradel:

Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2024, Vienna, Austria, September 16-20, 2024. ACM 2024, ISBN 979-8-4007-0612-7
Papers Round 1
- Jun Lyu

, Shanshan Li
, He Zhang
, Yang Zhang
, Guoping Rong
, Manuel Rigger
:
Detecting Build Dependency Errors in Incremental Builds. 1-12 - Shiwen Shan

, Yintong Huo
, Yuxin Su
, Yichen Li
, Dan Li
, Zibin Zheng
:
Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs. 13-25 - Xiaoyuan Xie

, Zhipeng Cai
, Songqiang Chen
, Jifeng Xuan
:
FastLog: An End-to-End Method to Efficiently Generate and Insert Logging Statements. 26-37 - Zhenyu Ye

, Lei Zhou
, Fengwei Zhang
, Wenqiang Jin
, Zhenyu Ning
, Yupeng Hu
, Zheng Qin
:
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor. 38-50 - Dominik Helm

, Tobias Roth
, Sven Keidel
, Michael Reif
, Mira Mezini
:
Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language Features. 51-62 - Yiyuan Guo

, Peisen Yao
, Charles Zhang
:
Precise Compositional Buffer Overflow Detection via Heap Disjointness. 63-75 - Yuheng Shen

, Jianzhong Liu
, Yiru Xu
, Hao Sun
, Mingzhe Wang
, Nan Guan
, Heyuan Shi
, Yu Jiang
:
Enhancing ROS System Fuzzing through Callback Tracing. 76-87 - Yunlong Ma

, Wentong Tian
, Xiang Gao
, Hailong Sun
, Li Li
:
API Misuse Detection via Probabilistic Graphical Model. 88-99 - Mahan Tafreshipour

, Anmol Deshpande
, Forough Mehralian
, Iftekhar Ahmed
, Sam Malek
:
Ma11y: A Mutation Framework for Web Accessibility Testing. 100-111 - Dominik Helm

, Sven Keidel
, Anemone Kampkötter
, Johannes Düsing
, Tobias Roth
, Ben Hermann
, Mira Mezini
:
Total Recall? How Good Are Static Call Graphs Really? 112-123 - Zhengran Zeng

, Yidong Wang
, Rui Xie
, Wei Ye
, Shikun Zhang
:
CoderUJB: An Executable and Unified Java Benchmark for Practical Programming Scenarios. 124-136 - Zhiying Wu

, Jiajing Wu
, Hui Zhang
, Ziwei Li
, Jiachi Chen
, Zibin Zheng
, Qing Xia
, Gang Fan
, Yi Zhen
:
DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3. 137-148 - Hao Wang

, Zeyu Gao
, Chao Zhang
, Mingyang Sun
, Yuchen Zhou
, Han Qiu
, Xi Xiao
:
CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection. 149-161 - Mira Bhagirathi Kaniyur

, Ana Cavalcante-Studart
, Yihan Yang
, Sangeon Park
, David Chen
, Duy Lam
, Lucas Bang
:
Interprocedural Path Complexity Analysis. 162-173 - Mingyi Zhou

, Xiang Gao
, Pei Liu
, John Grundy
, Chunyang Chen
, Xiao Chen
, Li Li
:
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models. 174-185 - Tianmin Hu

, Guixin Ye
, Zhanyong Tang
, Shin Hwei Tan
, Huanting Wang
, Meng Li
, Zheng Wang
:
UPBEAT: Test Input Checks of Q# Quantum Libraries. 186-198 - Xiaowei Guo

, Cai Fu
, Juan Chen
, Hongle Liu
, Lansheng Han
, Wenjin Li
:
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge. 199-209 - Junjie Yang

, Jiajun Jiang
, Zeyu Sun
, Junjie Chen
:
A Large-Scale Empirical Study on Improving the Fairness of Image Classification Models. 210-222 - Zhihan Jiang

, Jinyang Liu
, Junjie Huang
, Yichen Li
, Yintong Huo
, Jiazhen Gu
, Zhuangbin Chen
, Jieming Zhu
, Michael R. Lyu
:
A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We? 223-234 - Xin-Cheng Wen

, Cuiyun Gao
, Shuzheng Gao
, Yang Xiao
, Michael R. Lyu
:
SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection. 235-247 - Zhong Li

, Zhengfeng Xu
, Ruihua Ji
, Minxue Pan
, Tian Zhang
, Linzhang Wang
, Xuandong Li
:
Distance-Aware Test Input Selection for Deep Neural Networks. 248-260 - Mengxiao Zhang

, Yongqiang Tian
, Zhenyang Xu
, Yiwen Dong
, Shin Hwei Tan
, Chengnian Sun
:
LPR: Large Language Models-Aided Program Reduction. 261-273 - Yujia Chen

, Cuiyun Gao
, Zezhou Yang
, Hongyu Zhang
, Qing Liao
:
Bridge and Hint: Extending Pre-trained Language Models for Long-Range Code. 274-286 - Dongnan He

, Dongchen Xie
, Yujie Wang
, Wei You
, Bin Liang
, Jianjun Huang
, Wenchang Shi
, Zhuo Zhang
, Xiangyu Zhang
:
Define-Use Guided Path Exploration for Better Forced Execution. 287-299 - Xuezhi Song

, Yijian Wu
, Shuning Liu
, Bihuan Chen
, Yun Lin
, Xin Peng
:
C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging. 300-312 - Qi Guo

, Xiaohong Li
, Xiaofei Xie
, Shangqing Liu
, Ze Tang
, Ruitao Feng
, Junjie Wang
, Jidong Ge
, Lei Bu
:
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion. 313-324 - Tianyi Yang

, Cheryl Lee, Jiacheng Shen
, Yuxin Su
, Cong Feng
, Yongqiang Yang
, Michael R. Lyu
:
MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination Indexing. 325-337 - Jialuo Chen

, Jingyi Wang
, Youcheng Sun
, Peng Cheng
, Jiming Chen
:
Isolation-Based Debugging for Neural Networks. 338-349 - Hao Xiong

, Qinming Dai
, Rui Chang
, Mingran Qiu
, Renxiang Wang
, Wenbo Shen
, Yajin Zhou
:
Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries. 350-362 - Shengyi Pan

, You Wang
, Zhongxin Liu
, Xing Hu
, Xin Xia
, Shanping Li
:
Automating Zero-Shot Patch Porting for Hard Forks. 363-375 - You Lu

, Yifan Tian
, Yuyang Bi
, Bihuan Chen
, Xin Peng
:
DiaVio: LLM-Empowered Diagnosis of Safety Violations in ADS Simulation Testing. 376-388 - Zhaoyang Chu

, Yao Wan
, Qian Li
, Yang Wu
, Hongyu Zhang
, Yulei Sui
, Guandong Xu
, Hai Jin
:
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation. 389-401 - Maoyi Xie

, Ming Hu
, Ziqiao Kong
, Cen Zhang
, Yebo Feng
, Haijun Wang
, Yue Xue
, Hao Zhang
, Ye Liu
, Yang Liu
:
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications. 402-414 - Michael C. Gerten

, James I. Lathrop
, Myra B. Cohen
:
Traceback: A Fault Localization Technique for Molecular Programs. 415-427 - Zhongzhen Wen

, Jiayuan Zhou
, Minxue Pan
, Shaohua Wang
, Xing Hu
, Tongtong Xu
, Tian Zhang
, Xuandong Li
:
Silent Taint-Style Vulnerability Fixes Identification. 428-439 - Yicheng Ouyang

, Jun Yang
, Lingming Zhang
:
Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial Bugs. 440-452 - Hanxian Huang

, Jishen Zhao
:
Multi-modal Learning for WebAssembly Reverse Engineering. 453-465 - Chenyan Liu

, Yufan Cai
, Yun Lin
, Yuhuan Huang
, Yunrui Pei
, Bo Jiang
, Ping Yang
, Jin Song Dong
, Hong Mei
:
CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature. 466-478 - Ruixin Wang

, Minghai Lu
, Cody Hao Yu
, Yi-Hsiang Lai
, Tianyi Zhang
:
Automated Deep Learning Optimization via DSL-Based Source Code Transformation. 479-490 - Ying Cao

, Runze Zhang
, Ruigang Liang
, Kai Chen
:
Evaluating the Effectiveness of Decompilers. 491-502 - Hao Wang

, Zeyu Gao
, Chao Zhang
, Zihan Sha
, Mingyang Sun
, Yuchen Zhou
, Wenyu Zhu
, Wenju Sun
, Han Qiu
, Xi Xiao
:
CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision. 503-515 - Yunqi Liu

, Wei Song
:
FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas Fees. 516-527
Papers Round 2
- Zhensu Sun

, Xiaoning Du
, Xiapu Luo
, Fu Song
, David Lo
, Li Li
:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. 528-540 - Huan Nguyen

, Soumyakant Priyadarshan
, R. Sekar
:
Scalable, Sound, and Accurate Jump Table Analysis. 541-552 - Cuiying Gao

, Yueming Wu
, Heng Li
, Wei Yuan
, Haoyu Jiang
, Qidan He
, Yang Liu
:
Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines. 553-565 - Peilin Zheng

, Bowei Su
, Xiapu Luo
, Ting Chen
, Neng Zhang
, Zibin Zheng
:
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts. 566-577 - Mingke Yang

, Yuqi Chen
, Yi Liu
, Ling Shi
:
DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation. 578-589 - Kaixuan Li

, Jian Zhang
, Sen Chen
, Han Liu
, Yang Liu
, Yixiang Chen
:
PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software. 590-602 - Christoph Blumschein

, Fabio Niephaus
, Codrut Stancu
, Christian Wimmer
, Jens Lincke
, Robert Hirschfeld
:
Finding Cuts in Static Analysis Graphs to Debloat Software. 603-614 - Runxiang Cheng

, Shuai Wang
, Reyhaneh Jabbarvand
, Darko Marinov
:
Revisiting Test-Case Prioritization on Long-Running Test Suites. 615-627 - Zhiyu Fan

, Haifeng Ruan
, Sergey Mechtaev
, Abhik Roychoudhury
:
Oracle-Guided Program Selection from Large Language Models. 628-640 - Chuan Luo

, Shuangyu Lyu
, Qiyuan Zhao
, Wei Wu
, Hongyu Zhang
, Chunming Hu
:
Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable Systems. 641-653 - Benjamin Kushigian

, Samuel J. Kaufman
, Ryan Featherman
, Hannah Potter
, Ardi Madadi
, René Just
:
Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java Programs. 654-665 - Shuang Liu

, Junhao Lan
, Xiaoning Du
, Jiyuan Li
, Wei Lu
, Jiajun Jiang
, Xiaoyong Du
:
Testing Graph Database Systems with Graph-State Persistence Oracle. 666-677 - Demet Demir

, Aysu Betin Can
, Elif Sürer
:
Test Selection for Deep Neural Networks using Meta-Models with Uncertainty Metrics. 678-690 - Wachiraphan Charoenwet

, Patanamon Thongtanunam
, Van-Thuan Pham
, Christoph Treude
:
An Empirical Study of Static Analysis Tools for Secure Code Review. 691-703 - Thanh-Dat Nguyen

, Tung Do-Viet
, Hung Nguyen-Duy
, Tuan-Hai Luu
, Hung Le
, Bach Le
, Patanamon Thongtanunam
:
VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information Extraction. 704-716 - Xiaoyi Yang, Yuxing Wang, Tahmid Rafi, Dongfang Liu, Xiaoyin Wang, Xueling Zhang:

Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes. 717-729 - Haolai Wei

, Liwei Chen
, Zhijie Zhang
, Gang Shi
, Dan Meng
:
Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC. 730-742 - Li Lin

, Zongyin Hao
, Chengpeng Wang
, Zhuangda Wang
, Rongxin Wu
, Gang Fan
:
SQLess: Dialect-Agnostic SQL Query Simplification. 743-754 - Keqiang Li

, Siyang Weng
, Lyu Ni
, Chengcheng Yang
, Rong Zhang
, Xuan Zhou
, Aoying Zhou
:
DBStorm: Generating Various Effective Workloads for Testing Isolation Levels. 755-767 - Arooba Shahoor

, Jooyong Yi
, Dongsun Kim
:
Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-Call Bugs. 768-780 - Ishrak Hayet

, Adam Scott
, Marcelo d'Amorim
:
Feedback-Directed Partial Execution. 781-793 - Mingxi Ye

, Xingwei Lin
, Yuhong Nan
, Jiajing Wu
, Zibin Zheng
:
Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis. 794-805 - Long H. Pham

, Jun Sun
:
Certified Continual Learning for Neural Network Regression. 806-818 - Chunqiu Steven Xia

, Lingming Zhang
:
Automated Program Repair via Conversation: Fixing 162 out of 337 Bugs for $0.42 Each using ChatGPT. 819-831 - Haoran Fang

, Kaikai Zhang
, Donghui Yu
, Yuanyuan Zhang
:
DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling. 832-843 - Zhongrui Li

, Jiarun Dai
, Zongan Huang
, Nianhao You
, Yuan Zhang
, Min Yang
:
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing. 844-855 - Linna Xie

, Chongmin Li
, Yu Pei
, Tian Zhang
, Minxue Pan
:
BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming Assignments. 856-868 - Yakun Zhang

, Qihao Zhu
, Jiwei Yan
, Chen Liu
, Wenjie Zhang
, Yifan Zhao
, Dan Hao
, Lu Zhang
:
Synthesis-Based Enhancement for GUI Test Case Migration. 869-881 - Boyang Yang

, Haoye Tian
, Weiguo Pian
, Haoran Yu
, Haitao Wang
, Jacques Klein
, Tegawendé F. Bissyandé
, Shunfu Jin
:
CREF: An LLM-Based Conversational Software Repair Framework for Programming Tutors. 882-894 - Yining Yin

, Yang Feng
, Shihao Weng
, Yuan Yao
, Jia Liu
, Zhihong Zhao
:
Datactive: Data Fault Localization for Object Detection Systems. 895-907 - Zuohui Chen

, Jun Zhou
, Youcheng Sun
, Jingyi Wang
, Qi Xuan
, Xiaoniu Yang
:
Interpretability Based Neural Network Repair. 908-919 - Paul-Antoine Le Tolguenec

, Emmanuel Rachelson
, Yann Besse
, Florent Teichteil-Königsbuch
, Nicolas Schneider
, Hélène Waeselynck
, Dennis Wilson
:
Exploration-Driven Reinforcement Learning for Avionic System Fault Detection (Experience Paper). 920-931 - Parsa Alian

, Noor Nashid
, Mobina Shahbandeh
, Ali Mesbah
:
Semantic Constraint Inference for Web Form Test Generation. 932-944 - Jordan Samhi

, René Just
, Tegawendé F. Bissyandé
, Michael D. Ernst
, Jacques Klein
:
Call Graph Soundness in Android Static Analysis. 945-957 - Dezhi Ran

, Hao Wang
, Zihe Song
, Mengzhou Wu
, Yuan Cao
, Ying Zhang
, Wei Yang
, Tao Xie
:
Guardian: A Runtime Framework for LLM-Based UI Exploration. 958-970 - Jikai Wang

, Haoyu Wang
:
NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps. 971-982 - Xuanqi Gao

, Weipeng Jiang
, Juan Zhai
, Shiqing Ma
, Xiaoyu Zhang
, Chao Shen
:
Efficient DNN-Powered Software with Fair Sparse Models. 983-995 - Weilin Luo

, Pingjia Liang
, Junming Qiu
, Polong Chen
, Hai Wan
, Jianfeng Du
, Weiyuan Fang
:
Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace Checking. 996-1008 - Zhe Lang

, Zhengzi Xu
, Xiaohui Chen
, Shichao Lv
, Zhanwei Song
, Zhiqiang Shi
, Limin Sun
:
DeLink: Source File Information Recovery in Binaries. 1009-1021 - Kaifeng Huang

, Yingfeng Xia
, Bihuan Chen
, Siyang He
, Huazheng Zeng
, Zhuotong Zhou
, Jin Guo
, Xin Peng
:
Your "Notice" Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking. 1022-1034 - Wenxuan Zhao

, Ruiying Zeng
, Yangfan Zhou
:
Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation. 1035-1047 - Dingbang Wang

, Yu Zhao
, Sidong Feng
, Zhaoxu Zhang
, William G. J. Halfond
, Chunyang Chen
, Xiaoxia Sun
, Jiangfan Shi
, Tingting Yu
:
Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps. 1048-1060 - Yifeng He

, Jiabo Huang
, Yuyang Rong
, Yiwen Guo
, Ethan Wang
, Hao Chen
:
UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing. 1061-1072 - Lianghong Guo

, Yanlin Wang
, Ensheng Shi
, Wanjun Zhong
, Hongyu Zhang
, Jiachi Chen
, Ruikai Zhang
, Yuchi Ma
, Zibin Zheng
:
When to Stop? Towards Efficient Code Generation in LLMs with Excess Token Prevention. 1073-1085 - Tong Wang

, Taotao Gu
, Huan Deng
, Hu Li
, Xiaohui Kuang
, Gang Zhao
:
Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing. 1086-1098 - Hyungseok Kim

, Soomin Kim
, Jungwoo Lee
, Sang Kil Cha
:
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference. 1099-1111 - Chenghang Shi

, Haofeng Li
, Jie Lu
, Lian Li
:
Better Not Together: Staged Solving for Context-Free Language Reachability. 1112-1123 - Zhensu Sun

, Xiaoning Du
, Zhou Yang
, Li Li
, David Lo
:
AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code Generation. 1124-1136 - Xizhe Yin

, Yang Feng
, Qingkai Shi
, Zixi Liu
, Hongwang Liu
, Baowen Xu
:
FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation. 1137-1148 - Hieu Huynh

, Nhu Pham
, Tien N. Nguyen
, Vu Nguyen
:
Segment-Based Test Case Prioritization: A Multi-objective Approach. 1149-1160 - Paulo Canelas

, Bradley R. Schmerl
, Alcides Fonseca
, Christopher Steven Timperley
:
Understanding Misconfigurations in ROS: An Empirical Study and Current Approaches. 1161-1173 - Jiashui Wang

, Peng Qian
, Xilin Huang
, Xinlei Ying
, Yan Chen
, Shouling Ji
, Jianhai Chen
, Jundong Xie
, Long Liu
:
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. 1174-1185 - Elvira Albert

, Jesús Correas
, Pablo Gordillo
, Guillermo Román-Díez
, Albert Rubio
:
Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT. 1186-1197 - Jiachi Chen

, Chong Chen
, Jiang Hu
, John C. Grundy
, Yanlin Wang
, Ting Chen
, Zibin Zheng
:
Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow. 1198-1210 - Jiho Shin

, Sepehr Hashtroudi
, Hadi Hemmati
, Song Wang
:
Domain Adaptation for Code Model-Based Unit Test Case Generation. 1211-1222 - Cen Zhang

, Yaowen Zheng
, Mingqiang Bai
, Yeting Li
, Wei Ma
, Xiaofei Xie
, Yuekang Li
, Limin Sun
, Yang Liu
:
How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation. 1223-1235 - Guoqing Wang

, Zeyu Sun
, Yizhou Chen
, Yifan Zhao
, Qingyuan Liang
, Dan Hao
:
Commit Artifact Preserving Build Prediction. 1236-1248 - Antu Saha

, Yang Song
, Junayed Mahmud
, Ying Zhou
, Kevin Moran
, Oscar Chaparro
:
Toward the Automated Localization of Buggy Mobile App UIs from Bug Descriptions. 1249-1261 - Shangtong Cao

, Ningyu He
, Xinyu She
, Yixuan Zhang
, Mu Zhang
, Haoyu Wang
:
WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation. 1262-1273 - Xin Yin

, Chao Ni
, Shaohua Wang
, Zhenhao Li
, Limin Zeng
, Xiaohu Yang
:
ThinkRepair: Self-Directed Automated Program Repair. 1274-1286 - Chenyao Suo

, Junjie Chen
, Shuang Liu
, Jiajun Jiang
, Yingquan Zhao
, Jianrong Wang
:
Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis. 1287-1299 - Eduard Pinconschi

, Divya Gopinath
, Rui Abreu
, Corina S. Pasareanu
:
Evaluating Deep Neural Networks in Deployment: A Comparative Study (Replicability Study). 1300-1311 - Haoyang Ma

, Wuqi Zhang
, Qingchao Shen
, Yongqiang Tian
, Junjie Chen
, Shing-Chi Cheung
:
Towards Understanding the Bugs in Solidity Compiler. 1312-1324 - Zhanyao Lei

, Yixiong Chen
, Mingyuan Xia
, Zhengwei Qi
:
Foliage: Nourishing Evolving Software by Characterizing and Clustering Field Bugs. 1325-1337 - Gwihwan Go

, Chijin Zhou
, Quan Zhang
, Xiazijian Zou
, Heyuan Shi
, Yu Jiang
:
Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement. 1338-1350 - Zhijie Zhang

, Liwei Chen
, Haolai Wei
, Gang Shi
, Dan Meng
:
Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization. 1351-1363 - Jiongchi Yu

, Xiaofei Xie
, Cen Zhang
, Sen Chen
, Yuekang Li
, Wenbo Shen
:
Bugs in Pods: Understanding Bugs in Container Runtime Systems. 1364-1376 - Xiaoyong Yan

, Biao He
, Wenbo Shen
, Yu Ouyang
, Kaihang Zhou
, Xingjian Zhang
, Xingyu Wang
, Yukai Cao
, Rui Chang
:
Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph. 1377-1388 - Zhipeng Xue

, Zhipeng Gao
, Shaohua Wang
, Xing Hu
, Xin Xia
, Shanping Li
:
SelfPiCo: Self-Guided Partial Code Execution with LLMs. 1389-1401 - Yang Chen

, Reyhaneh Jabbarvand
:
Neurosymbolic Repair of Test Flakiness. 1402-1414 - Jovyn Tan

, Manuel Rigger
:
Inconsistencies in TeX-Produced Documents. 1415-1427 - Dong Li

, Meng Yan
, Yaosheng Zhang
, Zhongxin Liu
, Chao Liu
, Xiaohong Zhang
, Ting Chen
, David Lo
:
CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding. 1428-1439 - Shuohan Wu

, Zihao Li
, Hao Zhou
, Xiapu Luo
, Jianfeng Li
, Haoyu Wang
:
Following the "Thread": Toward Finding Manipulatable Bottlenecks in Blockchain Clients. 1440-1452 - An Guo

, Xinyu Gao
, Zhenyu Chen
, Yuan Xiao
, Jiakai Liu
, Xiuting Ge
, Weisong Sun
, Chunrong Fang
:
CooTest: An Automated Testing Approach for V2X Communication Systems. 1453-1465 - Purvish Jajal

, Wenxin Jiang
, Arav Tewari
, Erik Kocinare
, Joseph Woo
, Anusha Sarraf
, Yung-Hsiang Lu
, George K. Thiruvathukal
, James C. Davis
:
Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters. 1466-1478 - Xiangshan Gao

, Jialuo Chen
, Jingyi Wang
, Jie Shi
, Peng Cheng
, Jiming Chen
:
TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development. 1479-1490 - Xuyan Ma

, Yawen Wang
, Junjie Wang
, Xiaofei Xie
, Boyu Wu
, Shoubin Li
, Fanjiang Xu
, Qing Wang
:
Enhancing Multi-agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation. 1491-1503 - Xiaobao Cai

, Zhen Dong
, Yongjiang Wang
, Abhishek Tiwari
, Xin Peng
:
Reproducing Timing-Dependent GUI Flaky Tests in Android Apps via a Single Event Delay. 1504-1515 - Jinchen Xu

, Mengqi Cui
, Fei Li
, Zuoyan Zhang
, Hongru Yang
, Bei Zhou
, Jie Zhao
:
Arfa: An Agile Regime-Based Floating-Point Optimization Approach for Rounding Errors. 1516-1528 - Di Cui

, Qiangqiang Wang
, Yutong Zhao
, Jiaqi Wang
, Minjie Wei
, Jingzhao Hu
, Luqiao Wang
, Qingshan Li
:
One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural Network. 1529-1540 - Vishnu Asutosh Dasu

, Ashish Kumar
, Saeid Tizpaz-Niari
, Gang Tan
:
NeuFair: Neural Network Fairness Repair with Dropout. 1541-1553 - Bo Lin

, Shangwen Wang
, Ming Wen
, Liqian Chen
, Xiaoguang Mao
:
One Size Does Not Fit All: Multi-granularity Patch Generation for Better Automated Program Repair. 1554-1566 - Quentin Mazouni

, Helge Spieker
, Arnaud Gotlieb
, Mathieu Acher
:
Policy Testing with MDPFuzz (Replicability Study). 1567-1578 - Hao Guan

, Guangdong Bai
, Yepang Liu
:
Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware Prompts. 1579-1591 - Yuntong Zhang

, Haifeng Ruan
, Zhiyu Fan
, Abhik Roychoudhury
:
AutoCodeRover: Autonomous Program Improvement. 1592-1604 - Yuanyuan Yuan

, Shuai Wang
, Zhendong Su
:
See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing. 1605-1617 - Xiao Yu

, Lei Liu
, Xing Hu
, Jacky Keung
, Xin Xia
, David Lo
:
Practitioners' Expectations on Automated Test Generation. 1618-1630 - James Kukucka

, Luís Pina
, Paul Ammann
, Jonathan Bell
:
An Empirical Examination of Fuzzer Mutator Performance. 1631-1642 - Zhiyi Xue

, Liangguo Li
, Senyue Tian
, Xiaohong Chen
, Pingping Li
, Liangyu Chen
, Tingting Jiang
, Min Zhang
:
LLM4Fin: Fully Automating LLM-Powered Test Case Generation for FinTech Software Acceptance Testing. 1643-1655 - Jueon Eom

, Seyeon Jeong
, Taekyoung Kwon
:
Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation. 1656-1668 - Ali Ghanbari

:
Decomposition of Deep Neural Networks into Modules via Mutation Analysis. 1669-1681 - Shuwei Song

, Jiachi Chen
, Ting Chen
, Xiapu Luo
, Teng Li
, Wenwu Yang
, Leqing Wang
, Weijie Zhang
, Feng Luo
, Zheyuan He
, Yi Lu
, Pan Li
:
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis. 1682-1694 - Yingying Zheng

, Wensheng Dou
, Lei Tang
, Ziyu Cui
, Yu Gao
, Jiansen Song
, Liang Xu
, Jiaxin Zhu
, Wei Wang
, Jun Wei
, Hua Zhong
, Tao Huang
:
Testing Gremlin-Based Graph Database Systems via Query Disassembling. 1695-1707 - Zengyu Liu

, Liqian Chen
, Wanwei Liu
, Ji Wang
:
Synthesizing Boxes Preconditions for Deep Neural Networks. 1708-1719 - Feifan Wu

, Zhengxiong Luo
, Yanyang Zhao
, Qingpeng Du
, Junze Yu
, Ruikang Peng
, Heyuan Shi
, Yu Jiang
:
Logos: Log Guided Fuzzing for Protocol Implementations. 1720-1732 - Zhao Tian

, Honglin Shu
, Dong Wang
, Xuejie Cao
, Yasutaka Kamei
, Junjie Chen
:
Large Language Models for Equivalent Mutant Detection: How Far Are We? 1733-1745 - Qingxin Xu

, Yu Gao
, Jun Wei
:
An Empirical Study on Kubernetes Operator Bugs. 1746-1758 - Zeliang Yu

, Ming Wen
, Xiaochen Guo
, Hai Jin
:
Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset. 1759-1771 - Huaien Zhang

, Yu Pei
, Shuyun Liang
, Zezhong Xing
, Shin Hwei Tan
:
Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks. 1772-1784 - Yuxin Qiu

, Jie Hu
, Qian Zhang
, Heng Yin
:
Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks. 1785-1797 - Kevin Guan

, Owolabi Legunsen
:
An In-Depth Study of Runtime Verification Overheads during Software Testing. 1798-1810
ISSTA/ECOOP Tool Demonstrations
- Alessio Gambi

, Shreya Mathews
, Benedikt Steininger
, Mykhailo Poienko
, David Bobek
:
The Flexcrash Platform for Testing Autonomous Vehicles in Mixed-Traffic Scenarios. 1811-1815 - Ningyu He

, Zhehao Zhao
, Hanqin Guan
, Jikai Wang
, Shuo Peng
, Ding Li
, Haoyu Wang
, Xiangqun Chen
, Yao Guo
:
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries. 1816-1820 - Aleksandr Potapov

, Maksim Zuev
, Evgenii Moiseenko
, Nikita Koval
:
Testing Concurrent Algorithms on JVM with Lincheck and IntelliJ IDEA. 1821-1825 - Baoquan Cui

, Jiwei Yan
, Jian Zhang
:
DMMPP: Constructing Dummy Main Methods for Android Apps with Path-Sensitive Predicates. 1826-1830 - Zaiyu Cheng

, Tong Wu
, Peter Schrammel
, Norbert Tihanyi
, Eddie B. de Lima Filho
, Lucas C. Cordeiro
:
JCWIT: A Correctness-Witness Validator for Java Programs Based on Bounded Model Checking. 1831-1835 - Bruno Farias

, Rafael Menezes
, Eddie B. de Lima Filho
, Youcheng Sun
, Lucas C. Cordeiro
:
ESBMC-Python: A Bounded Model Checker for Python Programs. 1836-1840 - Evan Sultanik

, Marek Surovic
, Henrik Brodin
, Kelly Kaoudis
, Facundo Tuesca
, Carson Harmon
, Lisa Overall
, Joseph Sweeney
, Bradford Larsen
:
PolyTracker: Whole-Input Dynamic Information Flow Tracing. 1841-1845 - Pedro Tavares

, Ana C. R. Paiva, Domenico Amalfitano
, René Just
:
FRAFOL: FRAmework FOr Learning mutation testing. 1846-1850 - Luqiao Wang

, Qiangqiang Wang
, Jiaqi Wang
, Yutong Zhao
, Minjie Wei
, Zhou Quan
, Di Cui
, Qingshan Li
:
HECS: A Hypergraph Learning-Based System for Detecting Extract Class Refactoring Opportunities. 1851-1855 - Facundo Molina

, Juan Manuel Copia
, Alessandra Gorla
:
FixCheck: A Tool for Improving Patch Correctness Analysis. 1856-1860 - Ege Berkay Gulcan

, João Neto
, Burcu Kulahcioglu Ozkan
:
Generalized Concurrency Testing Tool for Distributed Systems. 1861-1865 - Paul Fiterau-Brostean

, Bengt Jonsson
, Konstantinos Sagonas
, Fredrik Tåquist
:
SMBugFinder: An Automated Framework for Testing Protocol Implementations for State Machine Bugs. 1866-1870 - Xutong Ma

, Jiwei Yan
, Jun Yan
, Jian Zhang
:
Panda: A Concurrent Scheduler for Compiler-Based Tools. 1871-1875 - Yunqi Liu

, Wei Song
:
FunRedisp: A Function Redispatch Tool to Reduce Invocation Gas Fees in Solidity Smart Contracts. 1876-1880
Late PhD Papers
- Roy David Margalit

:
Robustness against the C/C++11 Memory Model. 1881-1885 - Laura Plein

:
Learning the Effects of Software Changes. 1886-1890 - Bram Vandenbogaerde

:
Soft Verification for Actor Contract Systems. 1891-1895 - Drishti Yadav

:
From Fault Injection to Formal Verification: A Holistic Approach to Fault Diagnosis in Cyber-Physical Systems. 1896-1900 - José Antonio Zamudio Amaya

:
Shaping Test Inputs in Grammar-Based Fuzzing. 1901-1905
Early PhD Papers
- Alix Decrop

:
Leveraging Natural Language Processing and Data Mining to Augment and Validate APIs. 1906-1908 - Leon Freudenthaler

:
Decentralized Near-Synchronous Local-First Programming Collaboration. 1909-1911 - Kerstin Jacob

:
Integrating Mutation Techniques to Keep Specification and Source Code in Sync. 1912-1914 - Nimantha Kariyakarawana

:
Quality Assurance for Non-trivial Systems: Use Case GCC Plugins. 1915-1916 - Jie Qiu

:
Search-Based Translations for Tensor Operations. 1917-1919 - Michal Rozsíval

:
Automated Testing of Networked Systems Reliability. 1920-1922 - Luqiao Wang

:
Graph Learning for Extract Class Refactoring. 1923-1925 - Xin-Cheng Wen

:
Collaboration to Repository-Level Vulnerability Detection. 1926-1928

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














