


default search action
Proceedings of the ACM on Software Engineering, Volume 2
Volume 2, Number FSE, 2025
- Anji Li

, Neng Zhang
, Ying Zou
, Zhixiang Chen
, Jian Wang
, Zibin Zheng
:
CKTyper: Enhancing Type Inference for Java Code Snippets by Leveraging Crowdsourcing Knowledge in Stack Overflow. 176-196 - Ali Reza Ibrahimzada

, Kaiyao Ke
, Mrigank Pawagi
, Muhammad Salman Abid
, Rangeet Pan
, Saurabh Sinha
, Reyhaneh Jabbarvand
:
AlphaTrans: A Neuro-Symbolic Compositional Approach for Repository-Level Code Translation and Validation. 2454-2476 - Jaydeb Sarker

, Asif Kamal Turzo
, Amiangshu Bosu
:
The Landscape of Toxicity: An Empirical Investigation of Toxicity on GitHub. 623-646 - Zuobin Wang

, Zhiyuan Wan
, Yujing Chen
, Yun Zhang
, David Lo
, Difan Xie
, Xiaohu Yang
:
Clone Detection for Smart Contracts: How Far Are We? 1249-1269 - Rajrupa Chattaraj

, Sridhar Chimalakonda
:
NLP Libraries, Energy Consumption and Runtime: An Empirical Study. 2850-2873 - Wei-Hao Chen

, Jia Lin Cheoh
, Manthan Keim
, Sabine Brunswicker
, Tianyi Zhang
:
Towards Understanding Fine-Grained Programming Mistakes and Fixing Patterns in Data Science. 1824-1846 - Christian Rahe

, Walid Maalej
:
How Do Programming Students Use Generative AI? 978-1000 - Xu Yang

, Zhenbang Chen
, Wei Dong
, Ji Wang
:
QSF: Multi-objective Optimization Based Efficient Solving for Floating-Point Constraints. 511-532 - Junwei Zhang

, Xing Hu
, Shan Gao
, Xin Xia
, David Lo
, Shanping Li
:
Less Is More: On the Importance of Data Quality for Unit Test Generation. 1293-1316 - Junjie Chen

, Xingyu Fan
, Chen Yang
, Shuang Liu
, Jun Sun
:
De-duplicating Silent Compiler Bugs via Deep Semantic Representation. 2359-2381 - Ali Al-Kaswan

, Sebastian Deatc
, Begüm Koç
, Arie van Deursen
, Maliheh Izadi
:
Code Red! On the Harmfulness of Applying Off-the-Shelf Large Language Models to Programming Tasks. 2477-2499 - Yun Peng

, Jun Wan
, Yichen Li
, Xiaoxue Ren
:
COFFE: A Code Efficiency Benchmark for Code Generation. 242-265 - Bingkun Sun

, Shiqi Sun
, Jialin Ren
, Mingming Hu
, Kun Hu
, Liwei Shen
, Xin Peng
:
Detecting and Handling WoT Violations by Learning Physical Interactions from Device Logs. 599-622 - Yuqing Wang

, Mika V. Mäntylä
, Serge Demeyer
, Mutlu Beyazit
, Joanna Kisaakye
, Jesse Nyyssölä:
Cross-System Categorization of Abnormal Traces in Microservice-Based Systems via Meta-Learning. 576-598 - Xiaolei Ren

, Mengfei Ren
, Yu Lei
, Jiang Ming
:
Revisiting Optimization-Resilience Claims in Binary Diffing Tools: Insights from LLVM Peephole Optimization Analysis. 2689-2711 - Shayan Noei

, Heng Li
, Ying Zou
:
An Empirical Study on Release-Wise Refactoring Patterns. 403-424 - Weiyuan Tong

, Zixu Wang
, Zhanyong Tang
, Jianbin Fang
, Yuqun Zhang
, Guixin Ye
:
Directed Testing in MLIR: Unleashing Its Potential by Overcoming the Limitations of Random Fuzzing. 2288-2310 - Juan Altmayer Pizzorno

, Emery D. Berger
:
CoverUp: Effective High Coverage Test Generation for Python. 2897-2919 - Mouna Dhaouadi

, Bentley Oakes
, Michalis Famelis
:
Automated Extraction and Analysis of Developer's Rationale in Open Source Software. 2548-2570 - Kangchen Zhu

, Zhiliang Tian
, Shangwen Wang
, Weiguo Chen
, Zixuan Dong
, Mingyue Leng
, Xiaoguang Mao
:
MiSum: Multi-modality Heterogeneous Code Graph Learning for Multi-intent Binary Code Summarization. 1339-1362 - Zhengmin Yu

, Yuan Zhang
, Ming Wen
, Yinan Nie
, Wenhui Zhang
, Min Yang
:
CXXCrafter: An LLM-Based Agent for Automated C/C++ Open Source Software Building. 2618-2640 - Yinxi Liu

, Wei Meng
, Yinqian Zhang
:
Detecting Smart Contract State-Inconsistency Bugs via Flow Divergence and Multiplex Symbolic Execution. 22-43 - Mian Qin

, Yuxia Zhang
, Klaas-Jan Stol
, Hui Liu
:
Who Will Stop Contributing to OSS Projects? Predicting Company Turnover Based on Initial Behavior. 2782-2805 - Ruichao Liang

, Jing Chen
, Ruochen Cao
, Kun He
, Ruiying Du
, Shuhua Li
, Zheng Lin
, Cong Wu
:
SmartShot: Hunt Hidden Vulnerabilities in Smart Contracts using Mutable Snapshots. 65-85 - Gregorio Dalia

, Andrea Di Sorbo
, Corrado Aaron Visaggio
, Gerardo Canfora
:
It's Acting Odd! Exploring Equivocal Behaviors of Goodware. 2192-2215 - Xu Wang

, Mingming Zhang
, Xiangxin Meng
, Jian Zhang
, Yang Liu
, Chunming Hu
:
Element-Based Automated DNN Repair with Fine-Tuned Masked Language Model. 106-129 - Xiaohu Du

, Ming Wen
, Haoyu Wang
, Zichao Wei
, Hai Jin
:
Statement-Level Adversarial Attack on Vulnerability Detection Models via Out-of-Distribution Features. 3009-3032 - Huimin Hu

, Yingying Wang
, Julia Rubin
, Michael Pradel
:
An Empirical Study of Suppressed Static Analysis Warnings. 290-311 - Shuaiyu Xie

, Jian Wang
, Maodong Li
, Peiran Chen
, Jifeng Xuan
, Bing Li
:
TracePicker: Optimization-Based Trace Sampling for Microservice-Based Systems. 1802-1823 - Shoupeng Ren

, Lipeng He
, Tianyu Tu
, Di Wu
, Jian Liu
, Kui Ren
, Chun Chen
:
LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts. 1847-1869 - Sujin Jang

, Yeonhee Ryou
, Heewon Lee
, Kihong Heo
:
UnitCon: Synthesizing Targeted Unit Tests for Java Runtime Exceptions. 2053-2074 - Valentin Bourcier

, Pooja Rani
, Maximilian Ignacio Willembrinck Santander
, Alberto Bacchelli
, Steven Costiou
:
Empirically Evaluating the Impact of Object-Centric Breakpoints on the Debugging of Object-Oriented Programs. 914-935 - Junming Cao

, Xuwen Xiang
, Mingfei Cheng
, Bihuan Chen
, Xinyan Wang
, You Lu
, Chaofeng Sha
, Xiaofei Xie
, Xin Peng
:
RegTrieve: Reducing System-Level Regression Errors for Machine Learning Systems via Retrieval-Enhanced Ensemble. 1960-1982 - Francesco Sovrano

, Adam Bauer
, Alberto Bacchelli
:
Large Language Models for In-File Vulnerability Localization Can Be "Lost in the End". 891-913 - Kathryn T. Stolee

, Tobias Welp
, Caitlin Sadowski
, Sebastian G. Elbaum
:
10 Years Later: Revisiting How Developers Search for Code. 1205-1225 - Sayem Mohammad Imtiaz

, Astha Singh
, Fraol Batole
, Hridesh Rajan
:
IRepair: An Intent-Aware Approach to Repair Data-Driven Errors in Large Language Models. 1226-1248 - Haowen Yang

, Zhengda Li
, Zhiqing Zhong
, Xiaoying Tang
, Pinjia He
:
Towards Understanding Performance Bugs in Popular Data Science Libraries. 2335-2358 - Tanner Finken

, Jesse Chen
, Sazzadur Rahaman
:
On the Characteristics and Impacts of Protestware Libraries. 2500-2523 - Jia Chen

, Yuang He
, Peng Wang
, Xiaolei Chen
, Jie Shi
, Wei Wang
:
Alert Summarization for Online Service Systems by Validating Propagation Paths of Faults. 2169-2191 - Kunsong Zhao

, Zihao Li
, Weimin Chen
, Xiapu Luo
, Ting Chen
, Guozhu Meng
, Yajin Zhou
:
Recasting Type Hints from WebAssembly Contracts. 2665-2688 - Zhaoxu Zhang

, Komei Ryu
, Tingting Yu
, William G. J. Halfond
:
Automated Recognition of Buggy Behaviors from Mobile Bug Reports. 2240-2263 - Shaila Sharmin

, Anwar Hossain Zahid
, Subhankar Bhattacharjee
, Chiamaka Igwilo
, Miryung Kim
, Wei Le
:
Automatically Detecting Numerical Instability in Machine Learning Applications via Soft Assertions. 2806-2827 - Mengzhuo Chen

, Zhe Liu
, Chunyang Chen
, Junjie Wang
, Boyu Wu
, Jun Hu
, Qing Wang
:
Standing on the Shoulders of Giants: Bug-Aware Automated GUI Testing via Retrieval Augmentation. 825-846 - Sayali Kate

, Yifei Gao
, Shiwei Feng
, Xiangyu Zhang
:
ROSCallBaX: Statically Detecting Inconsistencies in Callback Function Setup of Robotic Systems. 668-689 - Tanakorn Leesatapornwongsa

, Fazle E. Faisal
, Suman Nath
:
ReproCopilot: LLM-Driven Failure Reproduction with Dynamic Refinement. 2920-2943 - Mingxuan Zhu

, Zeyu Sun
, Dan Hao
:
PDCAT: Preference-Driven Compiler Auto-tuning. 847-867 - Yanqi Su

, Zhenchang Xing
, Chong Wang
, Chunyang Chen
, Xiwei Xu, Qinghua Lu
, Liming Zhu
:
Automated Soap Opera Testing Directed by LLMs and Scenario Knowledge: Feasibility, Challenges, and Road Ahead. 757-778 - Yuntianyi Chen

, Yuqi Huai
, Yirui He
, Shilong Li
, Changnam Hong
, Qi Alfred Chen
, Joshua Garcia
:
A Comprehensive Study of Bug-Fix Patterns in Autonomous Driving Systems. 380-402 - Jiyuan Wang

, Yuxin Qiu
, Ben Limpanukorn
, Hong Jin Kang
, Qian Zhang
, Miryung Kim
:
DuoReduce: Bug Isolation for Multi-layer Extensible Compilation. 647-667 - Jenny T. Liang

, Melissa Lin
, Nikitha Rao
, Brad A. Myers
:
Prompts Are Programs Too! Understanding How Developers Build Software Containing Prompts. 1591-1614 - Haoran Yang

, Haipeng Cai
:
Dissecting Real-World Cross-Language Bugs. 1270-1292 - Haoran Liu

, Shan-shan Li
, Zhouyang Jia
, Yuanliang Zhang
, Linxiao Bai
, Si Zheng
, Xiaoguang Mao
, Xiangke Liao
:
Error Delayed Is Not Error Handled: Understanding and Fixing Propagated Error-Handling Bugs. 2571-2593 - Weibin Wu

, Yuhang Cao
, Ning Yi
, Rongyi Ou
, Zibin Zheng
:
Detecting and Reducing the Factual Hallucinations of Large Language Models with Metamorphic Testing. 1432-1453 - Yiwen Wu

, Yang Zhang
, Tao Wang
, Bo Ding
, Huaimin Wang
:
Towards Understanding Docker Build Faults in Practice: Symptoms, Root Causes, and Fix Patterns. 868-890 - Chaozheng Wang

, Jia Feng
, Shuzheng Gao
, Cuiyun Gao
, Zongjie Li
, Ting Peng
, Hailiang Huang
, Yuetang Deng
, Michael R. Lyu
:
Beyond PEFT: Layer-Wise Optimization for More Effective and Efficient Large Code Model Tuning. 1567-1590 - Dezhi Ran

, Yuan Cao
, Yuzhe Guo
, Yuetong Li
, Mengzhou Wu
, Simin Chen
, Wei Yang
, Tao Xie
:
Medusa: A Framework for Collaborative Development of Foundation Models with Automated Parameter Ownership Assignment. 2594-2617 - Hridya Dhulipala

, Aashish Yadavally
, Smit Soneshbhai Patel
, Tien N. Nguyen
:
CRISPE: Semantic-Guided Execution Planning and Dynamic Reasoning for Enhancing Code Coverage Prediction. 2965-2986 - Xu Yang

, Wenhan Zhu
, Michael Pacheco
, Jiayuan Zhou
, Shaowei Wang
, Xing Hu
, Kui Liu
:
Code Change Intention, Development Artifact, and History Vulnerability: Putting Them Together for Vulnerability Fix Detection by LLM. 489-510 - Yi Li

, Hridya Dhulipala
, Aashish Yadavally
, Xiaokai Rong
, Shaohua Wang
, Tien N. Nguyen
:
Blended Analysis for Predictive Execution. 2987-3008 - Xiao Chen

, Hengcheng Zhu
, Jialun Cao
, Ming Wen
, Shing-Chi Cheung
:
SemBIC: Semantic-Aware Identification of Bug-Inducing Commits. 1363-1385 - Matteo Biagiola

, Robert Feldt
, Paolo Tonella
:
Adaptive Random Testing with Q-grams: The Illusion Comes True. 533-553 - Zhenpeng Chen

, Xinyue Li
, Jie M. Zhang
, Weisong Sun
, Ying Xiao
, Tianlin Li
, Yiling Lou
, Yang Liu
:
Software Fairness Dilemma: Is Bias Mitigation a Zero-Sum Game? 1780-1801 - Bruno Kreyssig

, Alexandre Bartel
:
Gleipner: A Benchmark for Gadget Chain Detection in Java Deserialization Vulnerabilities. 1-21 - Amiao Gao

, Zenong Zhang
, Simin Wang
, Liguo Huang
, Shiyi Wei
, Vincent Ng
:
Teaching AI the 'Why' and 'How' of Software Vulnerability Fixes. 2006-2029 - Lukas Fruntke

, Jens Krinke
:
Automatically Fixing Dependency Breaking Changes. 2146-2168 - Md Rashedul Hasan, Mohammad Rashedul Hasan, Hamid Bagheri:

Unlocking Optimal ORM Database Designs: Accelerated Tradeoff Analysis with Transformers. 1639-1662 - Xu Yang

, Shaowei Wang
, Jiayuan Zhou
, Wenhan Zhu
:
One-for-All Does Not Work! Enhancing Vulnerability Detection by Mixture-of-Experts (MoE). 446-464 - Aryaz Eghbali

, Felix Burk
, Michael Pradel
:
DyLin: A Dynamic Linter for Python. 2828-2849 - Junyao Ye

, Zhen Li
, Xi Tang
, Deqing Zou
, Shouhuai Xu
, Weizhong Qiang
, Hai Jin
:
A Causal Learning Framework for Enhancing Robustness of Source Code Models. 2641-2664 - Shuwei Song

, Ting Chen
, Ao Qiao
, Xiapu Luo
, Leqing Wang
, Zheyuan He
, Ting Wang
, Xiaodong Lin
, Peng He
, Wensheng Zhang
, Xiaosong Zhang
:
Automated and Accurate Token Transfer Identification and Its Applications in Cryptocurrency Security. 1068-1090 - Yue Li

, Bohan Liu
, Ting Zhang
, Zhiqi Wang
, David Lo
, Lanxin Yang
, Jun Lyu
, He Zhang
:
A Knowledge Enhanced Large Language Model for Bug Localization. 1914-1936 - Weibin Wu

, Haoxuan Hu
, Zhaoji Fan
, Yitong Qiao
, Yizhan Huang
, Yichen Li
, Zibin Zheng
, Michael R. Lyu
:
An Empirical Study of Code Clones from Commercial AI Code Generators. 2874-2896 - Haodong Li

, Xiao Cheng
, Guohan Zhang
, Guosheng Xu
, Guoai Xu
, Haoyu Wang
:
Mitigating Emergent Malware Label Noise in DNN-Based Android Malware Detection. 1136-1159 - Siwei Tan

, Liqiang Lu
, Debin Xiang
, Tianyao Chu
, Congliang Lang
, Jintao Chen
, Xing Hu
, Jianwei Yin
:
HornBro: Homotopy-Like Method for Automated Quantum Program Repair. 734-756 - Yoav Alon

, Cristina David
:
Integrating Large Language Models and Reinforcement Learning for Non-linear Reasoning. 957-977 - Haris Ali Khan

, Yanjie Jiang
, Qasim Umer
, Yuxia Zhang
, Waseem Akram
, Hui Liu
:
Has My Code Been Stolen for Model Training? A Naturalness Based Approach to Code Contamination Detection. 1046-1067 - Xin Tan

, Xiao Long
, Yinghao Zhu
, Lin Shi
, Xiaoli Lian
, Li Zhang
:
Revolutionizing Newcomers' Onboarding Process in OSS Communities: The Future AI Mentor. 1091-1113 - Yujia Chen

, Yang Ye
, Zhongqi Li
, Yuchi Ma
, Cuiyun Gao
:
Smaller but Better: Self-Paced Knowledge Distillation for Lightweight yet Effective LCMs. 3057-3080 - Chunqiu Steven Xia

, Yinlin Deng
, Soren Dunn
, Lingming Zhang
:
Demystifying LLM-Based Software Engineering Agents. 801-824 - Mootez Saad

, José Antonio Hernández López
, Boqi Chen
, Dániel Varró
, Tushar Sharma
:
An Adaptive Language-Agnostic Pruning Method for Greener Language Models for Code. 1183-1204 - Hao He

, Bogdan Vasilescu
, Christian Kästner
:
Pinning Is Futile: You Need More Than Local Dependency Versioning to Defend against Supply Chain Attacks. 266-289 - Yuvraj Virk

, Premkumar T. Devanbu
, Toufique Ahmed
:
Calibration of Large Language Models on Code Summarization. 2944-2964 - Kyla Levin

, Nicolas van Kempen
, Emery D. Berger
, Stephen N. Freund
:
ChatDBG: Augmenting Debugging with Large Language Models. 1892-1913 - Farbod Daneshyan

, Runzhi He
, Jianyu Wu
, Minghui Zhou
:
SmartNote: An LLM-Powered, Personalised Release Note Generator That Just Works. 1663-1686 - Xiaoli Lian

, Shuaisong Wang
, Hanyu Zou
, Fang Liu
, Jiajun Wu
, Li Zhang
:
Incorporating Verification Standards for Security Requirements Generation from Functional Specifications. 1710-1732 - Borui Yang

, Md Afif Al Mamun
, Jie M. Zhang
, Gias Uddin
:
Hallucination Detection in Large Language Models with Metamorphic Relations. 425-445 - Gül Çalikli, Mohammed Alhamed

:
Impact of Request Formats on Effort Estimation: Are LLMs Different Than Humans? 1114-1135 - Yanlin Wang

, Tianyue Jiang
, Mingwei Liu
, Jiachi Chen
, Mingzhi Mao
, Xilin Liu
, Yuchi Ma
, Zibin Zheng
:
Beyond Functional Correctness: Investigating Coding Style Inconsistencies in Large Language Models. 690-712 - Waseem Akram

, Yanjie Jiang
, Yuxia Zhang
, Haris Ali Khan
, Hui Liu
:
LLM-Based Method Name Suggestion with Automatically Generated Context-Rich Prompts. 779-800 - Zhijie Wang

, Zhehua Zhou
, Jiayang Song
, Yuheng Huang
, Zhan Shu
, Lei Ma
:
VLATest: Testing and Evaluating Vision-Language-Action Models for Robotic Manipulation. 1615-1638 - Ranindya Paramitha

, Yuan Feng
, Fabio Massacci
:
Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches. 335-357 - Susheng Wu

, Ruisi Wang
, Yiheng Cao
, Bihuan Chen
, Zhuotong Zhou
, Yiheng Huang
, Junpeng Zhao
, Xin Peng
:
Mystique: Automated Vulnerability Patch Porting with Semantic and Syntactic-Enhanced LLM. 130-152 - Shaoheng Cao

, Renyi Chen
, Wenhua Yang
, Minxue Pan
, Xuandong Li
:
A Mixed-Methods Study of Model-Based GUI Testing in Real-World Industrial Settings. 1545-1566 - Meng Fan

, Yuxia Zhang
, Klaas-Jan Stol
, Hui Liu
:
Core Developer Turnover in the Rust Package Ecosystem: Prevalence, Impact, and Awareness. 2759-2781 - Yi Gao

, Xing Hu
, Xiaohu Yang
, Xin Xia
:
Automated Unit Test Refactoring. 713-733 - Myeongsoo Kim

, Saurabh Sinha
, Alessandro Orso
:
LlamaRestTest: Effective REST API Testing with Small Language Models. 465-488 - Haibo Wang

, Zezhong Xing
, Chengnian Sun
, Zheng Wang
, Shin Hwei Tan
:
Towards Diverse Program Transformations for Program Simplification. 312-334 - Yuteng Sun

, Joyanta Debnath
, Wenzheng Hong
, Omar Chowdhury
, Sze Yiu Chau
:
On the Unnecessary Complexity of Names in X.509 and Their Impact on Implementations. 1454-1474 - Ziqiao Kong

, Cen Zhang
, Maoyi Xie
, Ming Hu
, Yue Xue
, Ye Liu
, Haijun Wang
, Yang Liu
:
Smart Contract Fuzzing Towards Profitable Vulnerabilities. 153-175 - Soneya Binta Hossain

, Raygan Taylor
, Matthew B. Dwyer
:
Doc2OracLL: Investigating the Impact of Documentation on LLM-Based Test Oracle Generation. 1870-1891 - Jiaolong Kong

, Xiaofei Xie
, Shangqing Liu
:
Demystifying Memorization in LLM-Based Program Repair via a General Hypothesis Testing Framework. 2712-2734 - Lihua Guo

, Yiwei Hou
, Chijin Zhou
, Quan Zhang
, Yu Jiang
:
Ransomware Detection through Temporal Correlation between Encryption and I/O Behavior. 197-218 - Xingpei Li

, Yan Lei
, Zhouyang Jia
, Yuanliang Zhang
, Haoran Liu
, Liqian Chen
, Wei Dong
, Shan-shan Li
:
Bridging Operator Semantic Inconsistencies: A Source-Level Cross-Framework Model Conversion Approach. 2030-2052 - Max Weber

, Alina Mailach
, Sven Apel
, Janet Siegmund
, Raimund Dachselt
, Norbert Siegmund
:
Understanding Debugging as Episodes: A Case Study on Performance Bugs in Configurable Software Systems. 1409-1431 - Katherine Hough

, Jonathan Bell
:
Dynamic Taint Tracking for Modern Java Virtual Machines. 1757-1779 - Micheline Bénédicte Moumoula

, Abdoul Kader Kaboré
, Jacques Klein
, Tegawendé F. Bissyandé
:
The Struggles of LLMs in Cross-Lingual Code Clone Detection. 1023-1045 - Weiqi Lu

, Yongqiang Tian
, Xiaohan Zhong
, Haoyang Ma
, Zhenyang Xu
, Shing-Chi Cheung
, Chengnian Sun
:
An Empirical Study of Bugs in Data Visualization Libraries. 2075-2098 - Lam Nguyen Tung

, Steven Cho
, Xiaoning Du
, Neelofar
, Valerio Terragni
, Stefano Ruberto
, Aldeida Aleti
:
Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers. 2382-2405 - Yuan Li

, Peisen Yao
, Kan Yu
, Chengpeng Wang
, Yaoyang Ye
, Song Li
, Meng Luo
, Yepang Liu
, Kui Ren
:
Understanding Industry Perspectives of Static Application Security Testing (SAST) Evaluation. 3033-3056 - Addi Malviya-Thakur

, Reed Milewicz
, Mahmoud Jahanshahi
, Lavínia Paganini
, Bogdan Vasilescu
, Audris Mockus
:
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software. 2216-2239 - Zhi Tu

, Liangkun Niu
, Wei Fan
, Tianyi Zhang
:
Multi-modal Traffic Scenario Generation for Autonomous Driving System Testing. 1733-1756 - Trey Woodlief

, Felipe Toledo
, Matthew B. Dwyer
, Sebastian G. Elbaum
:
Scene Flow Specifications: Encoding and Monitoring Rich Temporal Safety Properties of Autonomous Systems. 2524-2547 - Weisong Sun

, Yuchen Chen
, Chunrong Fang
, Yebo Feng
, Yuan Xiao
, An Guo
, Quanjun Zhang
, Zhenyu Chen
, Baowen Xu
, Yang Liu
:
Eliminating Backdoors in Neural Code Models for Secure Code Understanding. 1386-1408 - Xiaokun Luan

, David Sanán
, Zhe Hou
, Qiyuan Xu
, Chengwei Liu
, Yufan Cai
, Yang Liu
, Meng Sun
:
Why the Proof Fails in Different Versions of Theorem Provers: An Empirical Study of Compatibility Issues in Isabelle. 1499-1521 - Ting Zhou

, Yanjie Zhao
, Xinyi Hou
, Xiaoyu Sun
, Kai Chen
, Haoyu Wang
:
DeclarUI: Bridging Design and Development with Automated Declarative UI Code Generation. 219-241 - Flavio Toffalini

, Nicolas Badoux
, Zurab Tsinadze
, Mathias Payer
:
Liberating Libraries through Automated Fuzz Driver Generation: Striking a Balance without Consumer Code. 2123-2145 - Jiongchi Yu

, Xiaofei Xie
, Qiang Hu
, Bowen Zhang
, Ziming Zhao
, Yun Lin
, Lei Ma
, Ruitao Feng
, Frank Liauw
:
CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift. 1687-1709 - Lars Gröninger

, Beatriz Souza
, Michael Pradel
:
ChangeGuard: Validating Code Changes via Pairwise Learning-Guided Execution. 936-956 - Ziyao He

, Syed Fatiul Huq
, Sam Malek
:
Enhancing Web Accessibility: Automated Detection of Issues with Generative AI. 2264-2287 - Md Mahir Asef Kabir

, Xiaoyin Wang
, Na Meng
:
Detecting Metadata-Related Bugs in Enterprise Applications. 1160-1182 - Xing Su

, Hanzhong Liang
, Hao Wu
, Ben Niu
, Fengyuan Xu
, Sheng Zhong
:
DiSCo: Towards Decompiling EVM Bytecode to Source Code using Large Language Models. 2311-2334 - Liqing Cao

, Haofeng Li
, Chenghang Shi
, Jie Lu
, Haining Meng
, Lian Li
, Jingling Xue
:
VulPA: Detecting Semantically Recurring Vulnerabilities with Multi-object Typestate Analysis. 2430-2453 - Alexi Turcotte

, Zheyuan Wu
:
Expressing and Checking Statistical Assumptions. 2735-2758 - Nima Karimipour

, Erfan Arvan
, Martin Kellogg
, Manu Sridharan
:
A New Approach to Evaluating Nullability Inference Tools. 358-379 - Hengcheng Zhu

, Valerio Terragni
, Lili Wei
, Shing-Chi Cheung
, Jiarong Wu
, Yepang Liu
:
Understanding and Characterizing Mock Assertions in Unit Tests. 554-575 - Han Zheng

, Flavio Toffalini
, Marcel Böhme
, Mathias Payer
:
MendelFuzz: The Return of the Deterministic Stage. 44-64 - Sebastian Schweikl

, Gordon Fraser
:
RePurr: Automated Repair of Block-Based Learners' Programs. 1475-1498 - Chenxu Wang

, Tianming Liu
, Yanjie Zhao
, Minghui Yang
, Haoyu Wang
:
LLMDroid: Enhancing Automated Mobile App GUI Testing Coverage with Large Language Model Guidance. 1001-1022 - Keyu Liang

, Zhongxin Liu
, Chao Liu
, Zhiyuan Wan
, David Lo
, Xiaohu Yang
:
Zero-Shot Cross-Domain Code Search without Fine-Tuning. 1937-1959 - Yuxuan Wan

, Chaozheng Wang
, Yi Dong
, Wenxuan Wang
, Shuqing Li
, Yintong Huo
, Michael R. Lyu
:
Divide-and-Conquer: Generating UI Code from Screenshots. 2099-2122 - Junjie Huang

, Zhihan Jiang
, Zhuangbin Chen
, Michael R. Lyu
:
No More Labelled Examples? An Unsupervised Log Parser with LLMs. 2406-2429 - Songyang Yan

, Xiaodong Zhang
, Kunkun Hao
, Haojie Xin
, Yonggang Luo
, Jucheng Yang
, Ming Fan
, Chao Yang
, Jun Sun
, Zijiang Yang
:
On-Demand Scenario Generation for Testing Automated Driving Systems. 86-105
Volume 2, Number ISSTA, 2025
- Zexu Wang

, Jiachi Chen
, Tao Zhang
, Yu Zhang
, Weizhe Zhang
, Yuming Feng
, Zibin Zheng
:
Copy-and-Paste? Identifying EVM-Inequivalent Code Smells in Multi-chain Reuse Contracts. 1031-1053 - Minying Fang

, Xing Yuan
, Yuying Li
, Haojie Li
, Chunrong Fang
, Junwei Du
:
Enhanced Prompting Framework for Code Summarization with Large Language Models. 1630-1653 - Jinhao Dong

, Jun Sun
, Wenjie Zhang
, Jin Song Dong
, Dan Hao
:
ConTested: Consistency-Aided Tested Code Generation with LLM. 596-617 - Rongkai Liu

, Heyuan Shi
, Shuning Liu
, Chao Hu
, Sisheng Li
, Yuheng Shen
, Runzhe Wang
, Xiaohai Shi
, Yu Jiang
:
PatchScope: LLM-Enhanced Fine-Grained Stable Patch Classification for Linux Kernel. 1513-1535 - Zhenlan Ji

, Pingchuan Ma
, Zongjie Li
, Zhaoyu Wang
, Shuai Wang
:
Causality-Aided Evaluation and Explanation of Large Language Model-Based Code Generation. 1374-1397 - Fan Wu

, Cuiyun Gao
, Shuqing Li
, Xin-Cheng Wen
, Qing Liao
:
MLLM-Based UI2Code Automation Guided by UI Layout Information. 1123-1145 - Lingxiao Tang

, Jiakun Liu
, Zhongxin Liu
, Xiaohu Yang
, Lingfeng Bao
:
LLM4SZZ: Enhancing SZZ Algorithm with Context-Enhanced Assessment on Large Language Models. 343-365 - Liangze Yin

, Yiwei Li
, Kun Chen
, Wei Dong
, Ji Wang
:
Incremental Verification of Concurrent Programs through Refinement Constraint Adaptation. 2251-2272 - Sifis Lagouvardos

, Yannis Bollanos
, Neville Grech
, Yannis Smaragdakis
:
The Incredible Shrinking Context... in a Decompiler Near You. 1350-1373 - Peng Qian

, Xinlei Ying
, Jiashui Wang
, Long Liu
, Lun Zhang
, Jianhai Chen
, Qinming He
:
FreeWavm: Enhanced WebAssembly Runtime Fuzzing Guided by Parse Tree Mutation and Snapshot. 159-181 - Qingchen Yu

, Xin Liu
, Qingguo Zhou
, Chunming Wu
:
Bridging the Gaps between Graph Neural Networks and Data-Flow Analysis: The Closer, the Better. 686-706 - Ravishka Rathnasuriya

, Nidhi Majoju
, Zihe Song
, Wei Yang
:
An Investigation on Numerical Bugs in GPU Programs Towards Automated Bug Detection. 1654-1677 - Miao Miao

, Sriteja Kummita
, Eric Bodden
, Shiyi Wei
:
Program Feature-Based Benchmarking for Fuzz Testing. 527-549 - Davide Molinelli

, Alberto Martin-Lopez
, Elliott Zackrone
, Beyza Eken
, Michael D. Ernst
, Mauro Pezzè
:
Tratto: A Neuro-Symbolic Approach to Deriving Axiomatic Test Oracles. 1887-1909 - Loi Ngo Duc Nguyen

, Tahiatul Islam
, Theron Wang
, Sam Lenz
, Martin Kellogg
:
Static Program Reduction via Type-Directed Slicing. 2068-2090 - Bolun Zhang

, Zeyu Gao
, Hao Wang
, Yuxin Cui
, Siliang Qin
, Chao Zhang
, Kai Chen
, Beibei Zhao
:
BinQuery: A Novel Framework for Natural Language-Based Binary Code Retrieval. 1167-1189 - Jiapeng Deng

, Tianming Liu
, Yanjie Zhao
, Chao Wang
, Lin Zhang
, Haoyu Wang
:
Walls Have Ears: Demystifying Notification Listener Usage in Android Apps. 434-456 - Yingwei Ma

, Rongyu Cao
, Yongchang Cao
, Yue Zhang
, Jue Chen
, Yibo Liu
, Yuchen Liu
, Binhua Li
, Fei Huang
, Yongbin Li
:
SWE-GPT: A Process-Centric Language Model for Automated Software Improvement. 2362-2383 - Huan Zhang

, Zhengkai Qin
, Lixin Zhao
, Aimin Yu
, Lijun Cai
, Dan Meng
:
Pepper: Preference-Aware Active Trapping for Ransomware. 1280-1302 - Bo Zhou

, Jiaqi Shi
, Ying Wang
, Li Li
, Tsz On Li
, Hai Yu
, Zhiliang Zhu
:
Porting Software Libraries to OpenHarmony: Transitioning from TypeScript or JavaScript to ArkTS. 1445-1466 - Zhuangbin Chen

, Junsong Pu
, Zibin Zheng
:
Tracezip: Efficient Distributed Tracing via Trace Compression. 411-433 - Lei Yu

, Zhirong Huang
, Hang Yuan
, Shiqi Cheng
, Li Yang
, Fengjun Zhang
, Chenjie Shen
, Jiajia Ma
, Jingyuan Zhang
, Junyi Lu
, Chun Zuo
:
Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection. 182-205 - Benyamin Beyzaei

, Saghar Talebipour
, Ghazal Rafiei
, Nenad Medvidovic
, Sam Malek
:
Automated Test Transfer across Android Apps using Large Language Models. 2227-2250 - Quan Hong

, Jiaqi Li
, Wen Zhang
, Lidong Zhai
:
DataHook: An Efficient and Lightweight System Call Hooking Technique without Instruction Modification. 92-112 - Lianghong Guo

, Wei Tao
, Runhan Jiang
, Yanlin Wang
, Jiachi Chen
, Xilin Liu
, Yuchi Ma
, Mingzhi Mao
, Hongyu Zhang
, Zibin Zheng
:
OmniGIRL: A Multilingual and Multimodal Benchmark for GitHub Issue Resolution. 24-46 - Jinwei Liu

, Chao Li
, Rui Chen
, Shaofeng Li
, Bin Gu
, Mengfei Yang
:
STRUT: Structured Seed Case Guided Unit Test Generation for C Programs using LLMs. 2113-2135 - Fanlang Zeng

, Rui Chang
, Hongjian Liu
:
Freesia: Verifying Correctness of TEE Communication with Concurrent Separation Logic. 2045-2067 - Sujin Han

, Jinseo Kim
, Sung-Ju Lee
, Insu Yun
:
Automated Attack Synthesis for Constant Product Market Makers. 47-68 - Ruofan Liu

, Xiwen Teoh
, Yun Lin
, Guanjie Chen
, Ruofei Ren
, Denys Poshyvanyk
, Jin Song Dong
:
GUIPilot: A Consistency-Based Mobile GUI Testing Approach for Detecting Application-Specific Bugs. 753-776 - Jiawei Guo

, Haoran Yang
, Haipeng Cai
:
VerLog: Enhancing Release Note Generation for Android Apps using Large Language Models. 1910-1932 - Zhiyu Zhang

, Longxing Li
, Ruigang Liang
, Kai Chen
:
Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG. 848-870 - Zhiyong Wu

, Jie Liang
, Jingzhou Fu
, Mingzhe Wang
, Yu Jiang
:
Hulk: Exploring Data-Sensitive Performance Anomalies in DBMSs via Data-Driven Analysis. 2181-2202 - Cundi Fang

, Jie Liang
, Zhiyong Wu
, Jingzhou Fu
, Zhouyang Jia
, Chun Huang
, Yu Jiang
, Shanshan Li
:
DepState: Detecting Synchronization Failure Bugs in Distributed Database Management Systems. 2001-2022 - Mingjie Shen

, Akul Abhilash Pillai
, Brian A. Yuan
, James C. Davis
, Aravind Machiry
:
Finding 709 Defects in 258 Projects: An Experience Report on Applying CodeQL to Open-Source Embedded Software (Experience Paper). 1077-1100 - Anshunkang Zhou

, Heqing Huang
, Charles Zhang
:
KRAKEN: Program-Adaptive Parallel Fuzzing. 274-296 - Bozhi Wu

, Chengjie Liu
, Zhiming Li
, Yushi Cao
, Jun Sun
, Shangwei Lin
:
Enhancing Vulnerability Detection via Inter-procedural Semantic Completion. 825-847 - Dezhen Kong

, Jiakun Liu
, Chao Ni
, David Lo
, Lingfeng Bao
:
More Effective JavaScript Breaking Change Detection via Dynamic Object Relation Graph. 2340-2361 - Siyuan Feng

, Jiawei Liu
, Ruihang Lai
, Charlie Ruan
, Yong Yu
, Lingming Zhang
, Tianqi Chen
:
Productively Deploying Emerging Models on Emerging Platforms: A Top-Down Approach for Testing and Debugging. 1818-1840 - Haodong Li

, Xiao Cheng
, Yanjie Zhao
, Guosheng Xu
, Guoai Xu
, Haoyu Wang
:
Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection. 320-342 - Renzhi Wang

, Mingfei Cheng
, Xiaofei Xie
, Yuan Zhou
, Lei Ma
:
MoDitector: Module-Directed Testing for Autonomous Driving Systems. 137-158 - Yibo Qu

, Dongliang Fang
, Zhen Wang
, Jiaxing Cheng
, Shuaizong Si
, Yongle Chen
, Limin Sun
:
ICEPRE: ICS Protocol Reverse Engineering via Data-Driven Concolic Execution. 2384-2406 - Islem Bouzenia

, Michael Pradel
:
You Name It, I Run It: An LLM Agent to Execute Tests of Arbitrary Projects. 1054-1076 - Nader Al Awar

, Muhammad Hannan Naeem
, James Almgren-Bell
, George Biros
, Milos Gligoric
:
Dynamically Fusing Python HPC Kernels. 1865-1886 - Mingwei Zheng

, Danning Xie
, Qingkai Shi
, Chengpeng Wang
, Xiangyu Zhang
:
Validating Network Protocol Parsers with Traceable RFC Document Interpretation. 1772-1794 - Zhilei Ren

, Yitao Li
, Xiaochen Li
, Guanxiao Qi
, Jifeng Xuan
, He Jiang
:
Reinforcement Learning-Based Fuzz Testing for the Gazebo Robotic Simulator. 1467-1488 - Lian Gao

, Heng Yin
:
BinDSA: Efficient, Precise Binary-Level Pointer Analysis with Context-Sensitive Heap Reconstruction. 1190-1211 - Chenbo Zhang

, Wenying Xu
, Jinbu Liu
, Lu Zhang
, Guiyang Liu
, Jihong Guan
, Qi Zhou
, Shuigeng Zhou
:
LogBase: A Large-Scale Benchmark for Semantic Log Parsing. 2091-2112 - Dongsong Yu

, Yiyi Wang
, Chao Zhang
, Yang Lan
, Zhiyuan Jiang
, Shuitao Gan
, Zheyu Ma
, Wende Tan
:
xFUZZ: A Flexible Framework for Fine-Grained, Runtime-Adaptive Fuzzing Strategy Composition. 69-91 - Philipp Straubinger

, Tommaso Fulcini
, Giacomo Garaccione
, Luca Ardito
, Gordon Fraser
:
Gamifying Testing in IntelliJ: A Replicability Study. 2407-2429 - Yiwei Hou

, Lihua Guo
, Chijin Zhou
, Quan Zhang
, Wenhuan Liu
, Chengnian Sun
, Yu Jiang
:
Preventing Disruption of System Backup against Ransomware Attacks. 229-249 - Yisong Xiao

, Aishan Liu
, Siyuan Liang
, Xianglong Liu
, Dacheng Tao
:
Fairness Mediator: Neutralize Stereotype Associations to Mitigate Bias in Large Language Models. 250-273 - Jiarui Che

, Chenkai Guo
, Naipeng Dong
, Jiaqi Pei
, Lingling Fan
, Xun Mi
, Xueshuo Xie
, Xiangyang Luo
, Zheli Liu
, Renhong Cheng
:
Uncovering API-Scope Misalignment in the App-in-App Ecosystem. 1933-1954 - Wai Kin Wong

, Daoyuan Wu
, Huaijin Wang
, Zongjie Li
, Zhibo Liu
, Shuai Wang
, Qiyi Tang
, Sen Nie
, Shi Wu
:
DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code. 1841-1864 - Yifan Xia

, Zichen Xie
, Peiyu Liu
, Kangjie Lu
, Yan Liu
, Wenhai Wang
, Shouling Ji
:
Beyond Static Pattern Matching? Rethinking Automatic Cryptographic API Misuse Detection in the Era of LLMs. 113-136 - Yingjie Fu

, Bozhou Li
, Linyi Li
, Wentao Zhang
, Tao Xie
:
The First Prompt Counts the Most! An Evaluation of Large Language Models on Iterative Example-Based Code Generation. 1583-1606 - Jie Ma

, Ningyu He
, Jinwen Xi
, Mingzhe Xing
, Haoyu Wang
, Ying Gao
, Yinliang Yue
:
OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum Virtual Machine. 1559-1582 - José Antonio Zamudio Amaya

, Marius Smytzek
, Andreas Zeller
:
FANDANGO: Evolving Language-Based Testing. 894-916 - Wei-Cheng Wu

, Stefan Nagy
, Christophe Hauser
:
WildSync: Automated Fuzzing Harness Synthesis via Wild API Usage Recovery. 963-984 - Yinghua Li

, Xueqi Dang
, Wendkûuni C. Ouédraogo
, Jacques Klein
, Tegawendé F. Bissyandé
:
AudioTest: Prioritizing Audio Test Cases. 707-730 - Nicolas Hubner

, Jean-Rémy Falleri
, Raluca Uricaru
, Thomas Degueule
, Thomas Durieux
:
What Happened in This Pipeline? Diffing Build Logs with CiDiff. 2023-2044 - Rui Yang

, Ziyu Cui
, Wensheng Dou
, Yu Gao
, Jiansen Song
, Xudong Xie
, Jun Wei
:
Detecting Isolation Anomalies in Relational DBMSs. 1725-1747 - Yuan Xiao

, Yuchen Chen
, Shiqing Ma
, Haocheng Huang
, Chunrong Fang
, Yanwei Chen
, Weisong Sun
, Yunfeng Zhu
, Xiaofang Zhang
, Zhenyu Chen
:
DeCoMa: Detecting and Purifying Code Dataset Watermarks through Dual Channel Code Abstraction. 1701-1724 - Ruiqi Wang

, Jiyu Guo
, Cuiyun Gao
, Guodong Fan
, Chun Yong Chong
, Xin Xia
:
Can LLMs Replace Human Evaluators? An Empirical Study of LLM-as-a-Judge in Software Engineering. 1955-1977 - Junkai Chen

, Zhenhao Li
, Qiheng Mao
, Xing Hu
, Kui Liu
, Xin Xia
:
Understanding Practitioners' Expectations on Clear Code Review Comments. 1257-1279 - Yuchong Xie

, Wenhui Zhang
, Dongdong She
:
ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference. 917-939 - Antoine Chevrot

, Alexandre Vernotte
, Jean-Rémy Falleri
, Xavier Blanc
, Bruno Legeard
, Aymeric Cretin
:
Are Autonomous Web Agents Good Testers? 206-228 - Dominik Frey

, Ulf Kargén
, Dániel Varró
:
Assessing Scene Generation Techniques for Testing COLREGS-Compliance of Autonomous Surface Vehicles. 985-1008 - He Ye

, Aidan Z. H. Yang
, Chang Hu
, Yanlin Wang
, Tao Zhang
, Claire Le Goues
:
AdverIntent-Agent: Adversarial Reasoning for Repair Based on Inferred Program Intent. 1398-1420 - Shaoheng Cao

, Minxue Pan
, Yuanhong Lan
, Xuandong Li
:
Intention-Based GUI Test Migration for Mobile Apps using Large Language Models. 2296-2318 - Hao Guan

, Guangdong Bai
, Yepang Liu
:
CrossProbe: LLM-Empowered Cross-Project Bug Detection for Deep Learning Frameworks. 2430-2452 - Guangsheng Fan

, Liqian Chen
, Banghu Yin
, Wenyu Zhang
, Peisen Yao
, Ji Wang
:
Program Analysis Combining Generalized Bit-Level and Word-Level Abstractions. 663-685 - Yu Gao

, Dong Wang
, Wensheng Dou
, Wenhan Feng
, Yu Liang
, Yuan Feng
, Jun Wei
:
Model Checking Guided Incremental Testing for Distributed Systems. 297-319 - Pengyu Xue

, Linhao Wu
, Zhen Yang
, Chengyi Wang
, Xiang Li
, Yuxiang Zhang
, Jia Li
, Ruikai Jin
, Yifei Pei
, Zhaoyan Shen
, Xiran Lyu
, Jacky Wai Keung
:
ClassEval-T: Evaluating Large Language Models in Class-Level Code Translation. 1421-1444 - Sourag Cherupattamoolayil

, Arunkumar Bhattar
, Connor Glosner
, Aravind Machiry
:
Adding Spatial Memory Safety to EDK II through Checked C (Experience Paper). 1212-1233 - Roozbeh Aghili

, Heng Li
, Foutse Khomh
:
Protecting Privacy in Software Logs: What Should Be Anonymized? 1317-1338 - Chun Li

, Hui Li
, Zhong Li
, Minxue Pan
, Xuandong Li
:
Improving Graph Learning-Based Fault Localization with Tailored Semi-supervised Learning. 1522-1544 - Jinmeng Zhou

, Ziyue Pan
, Wenbo Shen
, Xingkai Wang
, Kangjie Lu
, Zhiyun Qian
:
Type-Alias Analysis: Enabling LLVM IR with Accurate Types. 2203-2226 - Dianxiang Sun

, Wei Ma
, Liming Nie
, Yang Liu
:
SoK: A Taxonomic Analysis of DeFi Rug Pulls: Types, Dataset, and Tool Assessment. 550-572 - Haining Wang

, Yi Xiang
, Han Huang
, Jie Cao
, Kaichen Chen
, Xiaowei Yang
:
A Low-Cost Feature Interaction Fault Localization Approach for Software Product Lines. 940-962 - Lixin Xu

, Huayao Wu
, Zhenyu Pan
, Tongtong Xu
, Shaohua Wang
, Xintao Niu
, Changhai Nie
:
Effective REST APIs Testing with Error Message Analysis. 1978-2000 - Mingyu Huang

, Peili Mao
, Ke Li
:
Rethinking Performance Analysis for Configurable Software Systems: A Case Study from a Fitness Landscape Perspective. 1748-1771 - Weilin Luo

, Tingchen Han
, Junming Qiu
, Hai Wan
, Jianfeng Du
, Bo Peng
, Guohui Xiao
, Yanan Liu
:
NADA: Neural Acceptance-Driven Approximate Specification Mining. 1795-1817 - Ziyao Zhang

, Chong Wang
, Yanlin Wang
, Ensheng Shi
, Yuchi Ma
, Wanjun Zhong
, Jiachi Chen
, Mingzhi Mao
, Zibin Zheng
:
LLM Hallucinations in Practical Code Generation: Phenomena, Mechanism, and Mitigation. 481-503 - Jianlei Chi

, Xiaotian Wang
, Yuhan Huang
, Lechen Yu
, Di Cui
, Jianguo Sun
, Jun Sun
:
REACCEPT: Automated Co-evolution of Production and Test Code Based on Dynamic Validation and Large Language Models. 1234-1256 - Xuezixiang Li

, Sheng Yu
, Heng Yin
:
ALMOND: Learning an Assembly Language Model for 0-Shot Code Obfuscation Detection. 366-387 - Yiheng Cao

, Susheng Wu
, Ruisi Wang
, Bihuan Chen
, Yiheng Huang
, Chenhao Lu
, Zhuotong Zhou
, Xin Peng
:
Recurring Vulnerability Detection: How Far Are We? 573-595 - Xiaohan Yuan

, Jinfeng Li
, Dongxia Wang
, Yuefeng Chen
, Xiaofeng Mao
, Longtao Huang
, Jialuo Chen
, Hui Xue
, Xiaoxia Liu
, Wenhai Wang
, Kui Ren
, Jingyi Wang
:
S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models. 2136-2157 - Wei Song

, Xiaofan Xu
, Jeff Huang
:
GoPV: Detecting Blocking Concurrency Bugs Related to Shared-Memory Synchronization in Go. 2319-2339 - Zhuo Wu

, Zan Wang
, Chuan Luo
, Xiaoning Du
, Junjie Chen
:
No Bias Left Behind: Fairness Testing for Deep Recommender Systems Targeting General Disadvantaged Groups. 1607-1629 - Weining Cao

, Guangyuan Wu
, Tangzhi Xu
, Yuan Yao
, Hengfeng Wei
, Taolue Chen
, Xiaoxing Ma
:
Clause2Inv: A Generate-Combine-Check Framework for Loop Invariant Inference. 1009-1030 - Qicai Chen

, Kun Hu
, Sichen Gong
, Bihuan Chen
, Zikui Kong
, Haowen Jiang
, Bingkun Sun
, You Lu
, Xin Peng
:
Structure-Aware, Diagnosis-Guided ECU Firmware Fuzzing. 871-893 - Zhijie Liu

, Qiyi Tang
, Sen Nie
, Shi Wu
, Liang Feng Zhang
, Yutian Tang
:
KEENHash: Hashing Programs into Function-Aware Embeddings for Large-Scale Binary Code Similarity Analysis. 801-824 - Li Lin

, Qinglin Zhu
, Hongqiao Chen
, Zhuangda Wang
, Rongxin Wu
, Xiaoheng Xie
:
QTRAN: Extending Metamorphic-Oracle Based Logical Bug Detection Techniques for Multiple-DBMS Dialect Support. 731-752 - Shuqing Li

, Qisheng Zheng
, Cuiyun Gao
, Jia Feng
, Michael R. Lyu
:
Extended Reality Cybersickness Assessment via User Review Analysis. 1303-1325 - Yanzhou Mu

, Juan Zhai
, Chunrong Fang
, Xiang Chen
, Zhixiang Cao
, Peiran Yang
, Kexin Zhao
, An Guo
, Zhenyu Chen
:
Improving Deep Learning Framework Testing with Model-Level Metamorphic Testing. 2158-2180 - Siao Wang

, Zhen Dong
, Hui Li
, Liwei Shen
, Xin Peng
, Dongdong She
:
RouthSearch: Inferring PID Parameter Specification for Flight Control Program by Coordinate Search. 640-662 - Rony Shir

, Priyanka Prakash Surve
, Yuval Elovici
, Asaf Shabtai
:
Robust Vulnerability Detection across Compilations: LLVM-IR vs. Assembly with Transformer Model. 618-639 - Niklas Risse

, Jing Liu
, Marcel Böhme
:
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection. 388-410 - Zhiling Zhu

, Tieming Chen
, Chengwei Liu
, Han Liu
, Qijie Song
, Zhengzi Xu
, Yang Liu
:
Doctor: Optimizing Container Rebuild Efficiency by Instruction Re-orchestration. 1-23 - Ye Shang

, Quanjun Zhang
, Chunrong Fang
, Siqi Gu
, Jianyi Zhou
, Zhenyu Chen
:
A Large-Scale Empirical Study on Fine-Tuning Large Language Models for Unit Testing. 1678-1700 - Teng Zhang

, Yufei Liang
, Ganlin Li
, Tian Tan
, Chang Xu
, Yue Li
:
Bridge the Islands: Pointer Analysis for Microservice Systems. 504-526 - Matthew C. Davis

, Amy Wei
, Brad A. Myers
, Joshua Sunshine
:
TerzoN: Human-in-the-Loop Software Testing with a Composite Oracle. 1983-2005 - Haoxiang Tian

, Wenqiang Ding
, Xingshuo Han
, Guoquan Wu
, An Guo
, Junqi Zhang
, Wei Chen
, Jun Wei
, Tianwei Zhang
:
Testing the Fault-Tolerance of Multi-sensor Fusion Perception in Autonomous Driving Systems. 777-800 - Xiufeng Xu

, Fuman Xie
, Chenguang Zhu
, Guangdong Bai
, Sarfraz Khurshid
, Yi Li
:
Identifying Multi-parameter Constraint Errors in Python Data Science Library API Documentation. 1536-1558 - Oussama Draissi

, Tobias Cloosters
, David Klein
, Michael Rodler
, Marius Musch
, Martin Johns
, Lucas Davi
:
Wemby's Web: Hunting for Memory Corruption in WebAssembly. 1326-1349 - Lyuye Zhang

, Jiahui Wu
, Chengwei Liu
, Kaixuan Li
, Xiaoyu Sun
, Lida Zhao
, Chong Wang
, Yang Liu
:
Fixing Outside the Box: Uncovering Tactics for Open-Source Security Issue Management. 2273-2295 - Huan Li

, Bei Wang
, Xing Hu
, Xin Xia
:
Safe4U: Identifying Unsound Safe Encapsulations of Unsafe Calls in Rust using LLMs. 457-480 - Xiaoye Zheng

, Zhiyuan Wan
, David Lo
, Difan Xie
, Xiaohu Yang
:
Why Does My Transaction Fail? A First Look at Failed Transactions on the Solana Blockchain. 1489-1512 - Kaihua Qin

, Zhe Ye
, Zhun Wang
, Weilin Li
, Liyi Zhou
, Chao Zhang
, Dawn Song
, Arthur Gervais
:
Enhancing Smart Contract Security Analysis with Execution Property Graphs. 1101-1122 - Shangzhou Xia

, Jianjun Zhao
, Fuyuan Zhang
, Xiaoyu Guo
:
Quantum Concolic Testing. 1146-1166

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














