


default search action
47th ICSE 2025: Ottawa, ON, Canada
- 47th IEEE/ACM International Conference on Software Engineering, ICSE 2025, Ottawa, ON, Canada, April 26 - May 6, 2025. IEEE 2025, ISBN 979-8-3315-0569-1
- Setu Kumar Basak, K. Virgil English, Ken Ogura, Vitesh Kambara, Bradley Reaves, Laurie A. Williams:
AssetHarvester: A Static Analysis Tool for Detecting Secret-Asset Pairs in Software Artifacts. 1-13 - Xin-Cheng Wen, Zirui Lin, Cuiyun Gao, Hongyu Zhang, Yong Wang, Qing Liao:
Repository-Level Graph Representation Learning for Enhanced Security Patch Detection. 1-13 - Mingfei Cheng, Xiaofei Xie, Yuan Zhou, Junjie Wang, Guozhu Meng, Kairui Yang:
Decictor: Towards Evaluating the Robustness of Decision-Making in Autonomous Driving Systems. 1-13 - Benjamin Steenhoek, Kalpathy Sivaraman, Renata Saldivar Gonzalez, Yevhen Mohylevskyy, Roshanak Zilouchian Moghaddam, Wei Le:
Closing the Gap: A User Study on the Real-world Usefulness of AI-powered Vulnerability Detection & Repair in the IDE. 1-13 - Lezhi Ma, Shangqing Liu, Yi Li, Xiaofei Xie, Lei Bu:
SpecGen: Automated Generation of Formal Program Specifications via Large Language Models. 16-28 - Yizhou Chen, Zeyu Sun, Guoqing Wang, Dan Hao:
Gpass: A Goal-Adaptive Neural Theorem Prover Based on Coq for Automated Formal Verification. 29-41 - Freek Verbeek, Ali Shokri, Daniel Engel, Binoy Ravindran:
Formally Verified Binary-Level Pointer Analysis. 42-53 - Ziji Wu, Yu Huang, Peishan Huang, Shanghua Wen, Minglong Li, Ji Wang:
EffBT: An Efficient Behavior Tree Reactive Synthesis and Execution Framework. 54-65 - Zhiqing Zhong, Shilin He, Haoxuan Wang, Boxi Yu, Haowen Yang, Pinjia He:
An Empirical Study on Package-Level Deprecation in Python Ecosystem. 66-77 - Qingkai Shi, Xiaoheng Xie, Xianjin Fu, Peng Di, Huawei Li, Ang Zhou, Gang Fan:
Datalog-Based Language-Agnostic Change Impact Analysis for Microservices. 78-89 - Xiafa Wu, Brian Demsky:
GenC2Rust: Towards Generating Generic Rust Code from C. 90-102 - Kevin Guan, Owolabi Legunsen:
Instrumentation-Driven Evolution-Aware Runtime Verification. 103-115 - Jintao Huang, Kai Yang, Gaosheng Wang, Zhiqiang Shi, Zhiwen Pan, Shichao Lv, Limin Sun:
Moye: A Wallbreaker for Monolithic Firmware. 116-128 - Xingyu Wang, Mingsen Wang, Wenbo Shen, Rui Chang:
Understanding and Detecting Peer Dependency Resolving Loop in npm Ecosystem. 129-140 - Xu Chen, Ningning Cui, Zhe Pan, Liwei Chen, Gang Shi, Dan Meng:
Critical Variable State-Aware Directed Greybox Fuzzing. 141-152 - Shiyao Zhou, Jincheng Wang, He Ye, Hao Zhou, Claire Le Goues, Xiapu Luo:
LWDIFF: an LLM-Assisted Differential Testing Framework for Webassembly Runtimes. 153-164 - Gabriel Sherman, Stefan Nagy:
No Harness, No Problem: Oracle-guided Harnessing for Auto-generating C API Fuzzing Harnesses. 165-177 - Matteo Camilli, Raffaela Mirandola:
Parametric Falsification of Many Probabilistic Requirements Under Flakiness. 178-190 - Yang Feng, Zheyuan Lin, Dongchen Zhao, Mengbo Zhou, Jia Liu, James A. Jones:
RediI: Test Infrastructure to Enable Deterministic Reproduction of Failures for Distributed Systems. 191-203 - Syed Fatiul Huq, Mahan Tafreshipour, Kate Kalcevich, Sam Malek:
Automated Generation of Accessibility Test Reports from Recorded User Transcripts. 204-216 - Ben Limpanukorn, Jiyuan Wang, Hong Jin Kang, Eric Zitong Zhou, Miryung Kim:
Fuzzing MLIR Compilers with Custom Mutation Synthesis. 217-229 - Zexiang Zhang, Gaoning Pan, Ruipeng Wang, Yiming Tao, Zulie Pan, Cheng Tu, Min Zhang, Yang Li, Yi Shen, Chunming Wu:
Insvdf: Interface-State-Aware Virtual Device Fuzzing. 230-241 - Shihao Zhu, Yuqi Guo, Yan Cai, Bin Liang, Long Zhang, Rui Chen, Tingting Yu:
Reduce Dependence for Sound Concurrency Bug Prediction. 242-254 - Ziqiao Kong, Shaohua Li, Heqing Huang, Zhendong Su:
Sand: Decoupling Sanitization from Fuzzing for Low Overhead. 255-267 - Siyuan Li, Yuekang Li, Zuxin Chen, Chaopeng Dong, Yongpan Wang, Hong Li, Yongle Chen, Hongsong Zhu:
TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability Code. 268-280 - Tianchen Yu, Li Yuan, Liannan Lin, Hongkui He:
A Multiple Representation Transformer with Optimized Abstract Syntax Tree for Efficient Code Clone Detection. 281-293 - Cho-Ting Lee, Andrew Neeser, Shengzhe Xu, Jay Katyan, Patrick Cross, Sharanya Pathakota, Marigold Norman, John Simeone, Jaganmohan Chandrasekaran, Naren Ramakrishnan:
Can an LLM Find Its Way Around a Spreadsheet? 294-306 - Alex Sanchez-Stern, Abhishek Varghese, Zhanna Kaufman, Shizhuo Dylan Zhang, Talia Ringer, Yuriy Brun:
QEDCartographer: Automating Formal Verification Using Reward-Free Reinforcement Learning. 307-320 - Chong Wang, Jian Zhang, Yiling Lou, Mingwei Liu, Weisong Sun, Yang Liu, Xin Peng:
TIGER: A Generating-Then-Ranking Framework for Practical Python Type Inference. 321-333 - Xue Jiang, Yihong Dong, Yongding Tao, Huanyu Liu, Zhi Jin, Ge Li:
ROCODE: Integrating Backtracking Mechanism and Program Analysis in Large Language Models for Code Generation. 334-346 - Kyle Thompson, Nuno Saavedra, Pedro Carrott, Kevin Fisher, Alex Sanchez-Stern, Yuriy Brun, João F. Ferreira, Sorin Lerner, Emily First:
Rango: Adaptive Retrieval-Augmented Proving for Automated Software Verification. 347-359 - Trey Woodlief, Carl Hildebrandt, Sebastian G. Elbaum:
A Differential Testing Framework to Identify Critical AV Failures Leveraging Arbitrary Inputs. 360-372 - Shuai Wang, Yinan Yu, Robert Feldt, Dhasarathy Parthasarathy:
Automating a Complete Software Test Process Using LLMs: An Automotive Case Study. 373-384 - Venkata Sai Aswath Duvvuru, Bohan Zhang, Michael Vierhauser, Ankit Agrawal:
LLM-Agents Driven Automated Simulation Testing and Analysis of small Uncrewed Aerial Systems. 385-397 - Luciano Baresi, Davide Yi Xian Hu, Andrea Stocco, Paolo Tonella:
Efficient Domain Augmentation for Autonomous Driving Testing Using Diffusion Models. 398-410 - Linfeng Liang, Yao Deng, Kye Morton, Valtteri Kallinen, Alice James, Avishkar Seth, Endrowednes Kuantama, Subhas Mukhopadhyay, Richard Han, Xi Zheng:
GARL: Genetic Algorithm-Augmented Reinforcement Learning to Detect Violations in Marker-Based Autonomous Landing Systems. 411-423 - Ali Ebrahimi Pourasad, Walid Maalej:
Does GenAI Make Usability Testing Obsolete? 437-449 - Parsa Alian, Noor Nashid, Mobina Shahbandeh, Taha Shabani, Ali Mesbah:
Feature-Driven End-to-End Test Generation. 450-462 - Dehai Zhao, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu:
SeeAction: Towards Reverse Engineering How-What-Where of HCI Actions from Screencasts for UI Automation. 463-475 - Qikang Liu, Yang He, Yanwen Cai, Byeongguk Kwak, Yuepeng Wang:
Synthesizing Document Database Queries Using Collection Abstractions. 476-488 - Boqi Chen, José Antonio Hernández López, Gunter Mussbacher, Dániel Varró:
The Power of Types: Exploring the Impact of Type Checking on Neural Bug Detection in Dynamically Typed Languages. 489-501 - Shiyu Zhang, Haoyang Song, Qixin Wang, Henghua Shen, Yu Pei:
A Test Oracle for Reinforcement Learning Software Based on Lyapunov Stability Control Theory. 502-513 - Ravishka Rathnasuriya, Zijie Zhao, Wei Yang:
CodeImprove: Program Adaptation for Deep Code Models. 514-526 - Brian Hyeongseok Kim, Jingbo Wang, Chao Wang:
Fairquant: Certifying and Quantifying Fairness of Deep Neural Networks. 527-539 - Claudio Spiess, David Gros, Kunal Suresh Pai, Michael Pradel, Md. Rafiqul Islam Rabin, Amin Alipour, Susmit Jha, Prem Devanbu, Toufique Ahmed:
Calibration and Correctness of Language Models for Code. 540-552 - Yifan Wu, Yunpeng Wang, Ying Li, Wei Tao, Siyu Yu, Haowen Yang, Wei Jiang, Jianguo Li:
An Empirical Study on Commit Message Generation Using LLMs via In-Context Learning. 553-565 - Tanghaoran Zhang, Yue Yu, Xinjun Mao, Shangwen Wang, Kang Yang, Yao Lu, Zhang Zhang, Yuxin Zhao:
Instruct or Interact? Exploring and Eliciting LLMs' Capability in Code Snippet Adaptation Through Prompt Engineering. 566-577 - Shuzheng Gao, Cuiyun Gao, Wenchao Gu, Michael R. Lyu:
Search-Based LLMs for Code Optimization. 578-590 - Yubo Mai, Zhipeng Gao, Haoye Wang, Tingting Bi, Xing Hu, Xin Xia, Jianling Sun:
Towards Better Answers: Automated Stack Overflow Post Updating. 591-603 - Yuanliang Zhang, Yifan Xie, Shanshan Lit, Ke Liu, Chong Wang, Zhouyang Jia, Xiangbing Huang, Jie Song, Chaopeng Luo, Zhizheng Zheng, Rulin Xu, Yitong Liu, Si Zheng, Xiangke Liao:
Unseen Horizons: Unveiling the Real Capability of LLM Code Generation Beyond the Familiar. 604-615 - Jinan Jiang, Xinghao Peng, Jinzhao Chu, Xiapu Luo:
ConsCS: Effective and Efficient Verification of Circom Circuits. 616-628 - Changjian Zhang, Parv Kapoor, Ian Dardik, Leyi Cui, Rômulo Meira-Góes, David Garlan, Eunsuk Kang:
Constrained LTL Specification Learning from Examples. 629-641 - Ziyu Mao, Jingyi Wang, Jun Sun, Shengchao Qin, Jiawen Xiong:
LLM-Aided Automatic Modeling for Security Protocol Verification. 642-654 - Ying Fu, Zhiyong Wu, Yuanliang Zhang, Jie Liang, Jingzhou Fu, Yu Jiang, Shanshan Li, Xiangke Liao:
Thanos: DBMS Bug Detection via Storage Engine Rotation Based Differential Testing. 655-666 - Ying Fu, Zhiyong Wu, Yuanliang Zhang, Jie Liang, Jingzhou Fu, Yu Jiang, Shanshan Li, Xiangke Liao:
Thanos: DBMS Bug Detection via Storage Engine Rotation Based Differential Testing. 655-666 - Wenqian Deng, Jie Liang, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Yu Jiang:
Coni: Detecting Database Connector Bugs via State-Aware Test Case Generation. 667-678 - Zhiyong Wu, Jie Liang, Jingzhou Fu, Mingzhe Wang, Yu Jiang:
PUPPY: Finding Performance Degradation Bugs in DBMSs via Limited-Optimization Plan Construction. 679-690 - Chun Li, Hui Li, Zhong Li, Minxue Pan, Xuandong Li:
Enhancing Fault Localization in Industrial Software Systems via Contrastive Learning. 691-703 - Yueke Zhang, Anda Liang, Xiaohan Wang, Pamela Wisniewski, Fengwei Zhang, Kevin Leach, Yu Huang:
Who's Pushing the Code? An Exploration of GitHub Impersonation. 704-716 - Bianca Trinkenreich, Zixuan Feng, Rudrajit Choudhuri, Marco Aurélio Gerosa, Anita Sarma, Igor Steinmacher:
Investigating the Impact of Interpersonal Challenges on Feeling Welcome in OSS. 717-729 - Shide Zhou, Tianlin Li, Kailong Wang, Yihao Huang, Ling Shi, Yang Liu, Haoyu Wang:
Understanding the Effectiveness of Coverage Criteria for Large Language Models: A Special Angle from Jailbreak Attacks. 730-742 - Zhenpeng Chen, Xinyue Li, Jie M. Zhang, Federica Sarro, Yang Liu:
Diversity Drives Fairness: Ensemble of Higher Order Mutants for Intersectional Fairness of Machine Learning Software. 743-755 - Lingfeng Zhang, Zhaohui Wang, Yueling Zhang, Min Zhang, Jiangtao Wang:
HIFI: Explaining and Mitigating Algorithmic Bias Through the Lens of Game-Theoretic Interactions. 756-768 - Yanfu Yan, Viet Duong, Huajie Shao, Denys Poshyvanyk:
Towards More Trustworthy Deep Code Models by Enabling Out-of-Distribution Detection. 769-781 - Yining She, Sumon Biswas, Christian Kästner, Eunsuk Kang:
FairSense: Long-Term Fairness Analysis of ML-Enabled Systems. 782-794 - Sanan Hasanov, Stefan Nagy, Paul Gazzillo:
A Little Goes a Long Way: Tuning Configuration Selection for Continuous Kernel Fuzzing. 795-807 - Yesugen Baatartogtokh, Kaitlyn Cook, Alicia M. Grubb:
Exploring the Robustness of the Effect of EVO on Intention Valuation Through Replication. 808-820 - Francisco Cirelli, Dalal Alrajeh, Sebastián Uchitel:
Unavoidable Boundary Conditions: a Control Perspective on Goal Conflicts. 821-832 - Bimpe Ayoola, Miikka Kuutila, Rina R. Wehbe, Paul Ralph:
User Personas Improve Social Sustainability by Encouraging Software Developers to Deprioritize Antisocial Features. 833-845 - Georgios Sakkas, Pratyush Sahu, Kyeling Ong, Ranjit Jhala:
Neurosymbolic Modular Refinement Type Inference. 846-858 - Hyunjae Suh, Mahan Tafreshipour, Jiawei Li, Adithya Bhattiprolu, Iftekhar Ahmed:
An Empirical Study on Automatically Detecting AI-Generated Source Code: How Far are We? 859-871 - Smit Patel, Aashish Yadavally, Hridya Dhulipala, Tien N. Nguyen:
Planning a Large Language Model for Static Detection of Runtime Errors in Code Snippets. 872-884 - Chong Wang, Kaifeng Huang, Jian Zhang, Yebo Feng, Lyuye Zhang, Yang Liu, Xin Peng:
LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-Based Code Completion. 885-897 - Shuyin Ouyang, Jie M. Zhang, Zeyu Sun, Albert Meroño-Peñuela:
Knowledge-Enhanced Program Repair for Data Science Code. 898-910 - Wenwei Gu, Jiazhen Gu, Jinyang Liu, Zhuangbin Chen, Jianping Zhang, Jinxi Kuang, Cong Feng, Yongqiang Yang, Michael R. Lyu:
ADAMAS: Adaptive Domain-Aware Performance Anomaly Detection in Cloud Service Systems. 911-923 - Zeyang Ma, Dong Jae Kim, Tse-Hsun Peter Chen:
LibreLog: Accurate and Efficient Unsupervised Log Parsing Using Open-Source Large Language Models. 924-936 - Xiaopeng Li, Shangwen Wang, Shasha Li, Jun Ma, Jie Yu, Xiaodong Liu, Jing Wang, Bin Ji, Weimin Zhang:
Model Editing for LLMs4Code: How Far are we? 937-949 - Christof Tinnes, Alisa Welter, Sven Apel:
Software Model Evolution with Large Language Models: Experiments on Simulated, Public, and Industrial Datasets. 950-962 - Haifeng Ruan, Yuntong Zhang, Abhik Roychoudhury:
SpecRover: Code Intent Extraction via LLMs. 963-974 - Van-Hoang Le, Yi Xiao, Hongyu Zhang:
Unleashing the True Potential of Semantic-Based Log Parsing with Pre-Trained Language Models. 975-987 - Youpeng Ma, Tao Chen, Ke Li:
Faster Configuration Performance Bug Testing with Neural Dual-Level Prioritization. 988-1000 - Annibale Panichella:
Metamorphic-Based Many-Objective Distillation of LLMs for Code-Related Tasks. 1001-1013 - Kaiyao Ke:
NIODebugger: A Novel Approach to Repair Non-Idempotent-Outcome Tests with LLM-Based Agent. 1014-1025 - Zifan Nan, Zhaoqiang Guo, Kui Liu, Xin Xia:
Test Intention Guided LLM-Based Unit Test Generation. 1026-1038 - Xin Yin, Chao Ni, Xiaodan Xu, Xiaohu Yang:
What You See is What You Get: Attention-Based Self-Guided Automatic Unit Test Generation. 1039-1051 - Giacomo Benedetti, Oreofe Solarin, Courtney Miller, Greg Tystahl, William Enck, Christian Kästner, Alexandros Kapravelos, Alessio Merlo, Luca Verderame:
An Empirical Study on Reproducible Packaging in Open-Source Ecosystems. 1052-1063 - Miao Miao, Austin Mordahl, Dakota Soles, Alice Beideck, Shiyi Wei:
An Extensive Empirical Study of Nondeterministic Behavior in Static Analysis Tools. 1064-1076 - Madeline Janecek, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj:
Execution Trace Reconstruction Using Diffusion-Based Generative Models. 1077-1088 - Chenxi Zhang, Yufei Liang, Tian Tan, Chang Xu, Shuangxiang Kan, Yulei Sui, Yue Li:
Interactive Cross-Language Pointer Analysis for Resolving Native Code in Java Programs. 1089-1100 - Baoquan Cui, Rong Qu, Zhen Tang, Jian Zhang:
Static Analysis of Remote Procedure Call in Java Programs. 1101-1113 - Aashish Yadavally, Xiaokai Rong, Phat Nguyen, Tien N. Nguyen:
Large Language Models for Safe Minimization. 1114-1126 - Qi Guo, Xiaofei Xie, Shangqing Liu, Ming Hu, Xiaohong Li, Lei Bu:
Intention is All you Need: Refining your Code from your Intention. 1127-1139 - Yanlin Wang, Yanli Wang, Daya Guo, Jiachi Chen, Ruikai Zhang, Yuchi Ma, Zibin Zheng:
RLCoder: Reinforcement Learning for Repository-Level Code Completion. 1140-1152 - Marcos Macedo, Yuan Tian, Pengyu Nie, Filipe Roseiro Côgo, Bram Adams:
INTERTRANS: Leveraging Transitive Intermediate Translations to Enhance LLM-Based Code Translation. 1153-1164 - Yorick Sens, Henriette Knopp, Sven Peldszus, Thorsten Berger:
A Large-Scale Study of Model Integration in ML-Enabled Software Systems. 1165-1177 - Yuchen Shao, Yuheng Huang, Jiawei Shen, Lei Ma, Ting Su, Chengcheng Wan:
Are LLMs Correctly Integrated into Software Systems? 1178-1190 - Zhiming Chi, Jianan Ma, Pengfei Yang, Cheng-Chao Huang, Renjue Li, Jingyi Wang, Xiaowe Huang, Lijun Zhang:
Patch Synthesis for Property Repair of Deep Neural Networks. 1191-1203 - Zeinabsadat Saghi, Thomas Zimmermann, Souti Chattopadhyay:
Code Today, Deadline Tomorrow: Procrastination Among Software Developers. 1204-1216 - Kaia Newman, Sarah Snay, Madeline Endres, Manasvi Parikh, Andrew Begel:
"Get Me in the Groove": a Mixed Methods Study on Supporting Adhd Professional Programmers. 1217-1229 - Ruchit Rawal, Victor-Alexandru Padurean, Sven Apel, Adish Singla, Mariya Toneva:
Hints Help Finding and Fixing Bugs Differently in Python and Text-Based Program Representations. 1230-1242 - Ruanqianqian (Lisa) Huang, Savitha Ravi, Michael He, Boyu Tian, Sorin Lerner, Michael Coblenz:
How Scientists Use Jupyter Notebooks: Goals, Quality Attributes, and Opportunities. 1243-1255 - Seongmin Lee, Shreyas Minocha, Marcel Böhme:
Accounting for Missing Events in Statistical Information Leakage Analysis. 1256-1267 - Hao Song, Teng Li, Jiachi Chen, Ting Chen, Beibei Li, Zhangyan Lin, Yi Lu, Pan Li, Xihan Zhou:
Enhancing the Open Network: Definition and Automated Detection of Smart Contract Defects. 1281-1293 - Paschal C. Amusuo, Kyle A. Robinson, Tanmay Singla, Huiyun Peng, Aravind Machiry, Santiago Torres-Arias, Laurent Simon, James C. Davis:
$ZTD_{\text{JAVA}}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies. 1294-1306 - Yi Sun, Zhuo Zhang, Xiangyu Zhang:
FairChecker: Detecting Fund-Stealing Bugs in DeFi Protocols via Fairness Validation. 1307-1319 - Fraol Batole, David O'Brien, Tien N. Nguyen, Robert Dyer, Hridesh Rajan:
An LLM-Based Agent-Oriented Approach for Automated Code Design Issue Localization. 1320-1332 - Yulong Ye, Tao Chen, Miqing Li:
Distilled Lifelong Self-Adaptation for Configurable Systems. 1333-1345 - Yichen Li, Yulun Wu, Jinyang Liu, Zhihan Jiang, Zhuangbin Chen, Guangba Yu, Michael R. Lyu:
COCA: Generative Root Cause Analysis for Distributed Systems with Code Knowledge. 1346-1358 - Yifeng Di, Tianyi Zhang:
Enhancing Code Generation via Bidirectional Comment-Level Mutual Grounding. 1359-1371 - Dewu Zheng, Yanlin Wang, Ensheng Shi, Ruikai Zhang, Yuchi Ma, Hongyu Zhang, Zibin Zheng:
HumanEvo: An Evolution-Aware Benchmark for More Realistic Evaluation of Repository-Level Code Generation. 1372-1384 - Stefan Schwedt, Thomas Ströder:
From Bugs to Benefits: Improving User Stories by Leveraging Crowd Knowledge with CrUISE-AC. 1385-1395 - Dominik Fuchbeta, Tobias Hey, Jan Keim, Haoyu Liu, Niklas Ewald, Tobias Thirolf, Anne Koziolek:
LiSSA: Toward Generic Traceability Link Recovery Through Retrieval- Augmented Generation. 1396-1408 - Myeongsoo Kim, Tyler Stennett, Saurabh Sinha, Alessandro Orso:
A Multi-Agent Approach for REST API Testing with Semantic Graphs and LLM-Driven Inputs. 1409-1421 - Hongyan Gao, Yibiao Yang, Maolin Sun, Jiangchang Wu, Yuming Zhou, Baowen Xu:
Clozemaster: Fuzzing Rust Compiler by Harnessing Llms for Infilling Masked Real Programs. 1422-1435 - Jiageng Li, Zhen Dong, Chong Wang, Haozhen You, Cen Zhang, Yang Liu, Xin Peng:
LLM Based Input Space Partitioning Testing for Library APIs. 1436-1448 - Amirhossein Deljouyi, Roham Koohestani, Maliheh Izadi, Andy Zaidman:
Leveraging Large Language Models for Enhancing the Understandability of Generated Unit Tests. 1449-1461 - Jiyang Zhang, Yu Liu, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
exLong: Generating Exceptional Behavior Tests with Large Language Models. 1462-1474 - Soneya Binta Hossain, Matthew B. Dwyer:
TOGLL: Correct and Strong Test Oracle Generation with LLMS. 1475-1487 - Tajkia Rahman Toma, Balreet Grewal, Cor-Paul Bezemer:
Answering User Questions About Machine Learning Models Through Standardized Model Cards. 1488-1500 - Verya Monjezi, Ashutosh Trivedi, Vladik Kreinovich, Saeid Tizpaz-Niari:
Fairness Testing Through Extreme Value Theory. 1501-1513 - Zhao Tian, Junjie Chen, Xiangyu Zhang:
Fixing Large Language Models' Specification Misunderstanding for Better Code Generation. 1514-1526 - Feng Lin, Dong Jae Kim, Tse-Hsun Chen:
SOEN-101: Code Generation by Emulating Software Process Models Using Large Language Model Agents. 1527-1539 - Nadia Nahar, Haoran Zhang, Grace A. Lewis, Shurui Zhou, Christian Kästner:
The Product Beyond the Model - An Empirical Study of Repositories of Open-Source ML Products. 1540-1552 - Geraldine Galindo-Gutierrez, Juan Pablo Sandoval Alcocer, Nicolas Jimenez-Fuentes, Alexandre Bergel, Gordon Fraser:
Increasing the Effectiveness of Automatically Generated Tests by Improving Class Observability. 1553-1565 - Octavio Galland, Marcel Böhme:
Invivo Fuzzing by Amplifying Actual Executions. 1566-1578 - Chuan Luo, Shuangyu Lyu, Wei Wu, Hongyu Zhang, Dianhui Chu, Chunming Hu:
Towards High-Strength Combinatorial Interaction Testing for Highly Configurable Software Systems. 1579-1591 - Xintong Zhou, Zhenyang Xu, Mengxiao Zhang, Yongqiang Tian, Chengnian Sun:
WDD: Weighted Delta Debugging. 1592-1603 - Jaehyeok Lee, Sooyoung Cha:
Topseed: Learning Seed Selection Strategies for Symbolic Execution from Scratch. 1604-1615 - Zhiyuan Li, Jingzheng Wu, Xiang Ling, Tianyue Luo, Zhiqing Rui, Yanjun Wu:
The Seeds of the Future Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries. 1616-1627 - Yuling Shi, Hongyu Zhang, Chengcheng Wan, Xiaodong Gu:
Between Lines of Code: Unraveling the Distinct Patterns of Machine and Human Programmers. 1628-1639 - Rosalia Tufano, Alberto Martin-Lopez, Ahmad Tayeb, Ozren Dabic, Sonia Haiduc, Gabriele Bavota:
Deep Learning-based Code Reviews: A Paradigm Shift or a Double-Edged Sword? 1640-1652 - Luís F. Gomes, Vincent J. Hellendoorn, Jonathan Aldrich, Rui Abreu:
An Exploratory Study of ML Sketches and Visual Code Assistants. 1653-1664 - Weiwei Xu, Kai Gao, Hao He, Minghui Zhou:
Licoeval: Evaluating LLMs on License Compliance in Code Generation. 1665-1677 - Sadra Sabouri, Philipp Eibl, Xinyi Zhou, Morteza Ziyadi, Nenad Medvidovic, Lars Lindemann, Souti Chattopadhyay:
Trust Dynamics in AI-Assisted Development: Definitions, Factors, and Implications. 1678-1690 - Rudrajit Choudhuri, Bianca Trinkenreich, Rahul Pandita, Eirini Kalliamvakou, Igor Steinmacher, Marco Aurélio Gerosa, Christopher Sanchez, Anita Sarma:
What Guides Our Choices? Modeling Developers' Trust and Behavioral Intentions Towards Genai. 1691-1703 - Xinyu Lian, Yinfang Chen, Runxiang Cheng, Jie Huang, Parth Thakkar, Minjia Zhang, Tianyin Xu:
Large Language Models as Configuration Validators. 1704-1716 - Nausheen Mohammed, Akash Lal, Aseem Rastogi, Rahul Sharma, Subhajit Roy:
LLM Assistance for Memory Safety. 1717-1728 - Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David A. Wagner, Baishakhi Ray, Yizheng Chen:
Vulnerability Detection with Code Language Models: How Far are We? 1729-1741 - Wei Ma, Daoyuan Wu, Yuqiang Sun, Tianwen Wang, Shangqing Liu, Jian Zhang, Yue Xue, Yang Liu:
Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications. 1742-1754 - Saikat Chakraborty, Gabriel Ebner, Siddharth Bhat, Sarah Fakhoury, Sakina Fatima, Shuvendu K. Lahiri, Nikhil Swamy:
Towards Neural Synthesis for SMT-Assisted Proof-Oriented Programming. 1755-1767 - Rodrigo Pedro, Miguel E. Coimbra, Daniel Castro, Paulo Carreira, Nuno Santos:
Prompt-to-SQL Injections in LLM-Integrated Web Applications: Risks and Defenses. 1768-1780 - Yongchao Wang, Yuandao Cai, Charles Zhang:
Boosting Path-Sensitive Value Flow Analysis Via Removal of Redundant Summaries. 1781-1792 - Taha Shabani, Noor Nashid, Parsa Alian, Ali Mesbah:
Dockerfile Flakiness: Characterization and Repair. 1793-1805 - Yicheng Wang, Wensheng Dou, Yu Liang, Yi Wang, Wei Wang, Jun Wei, Tao Huang:
Evaluating Garbage Collection Performance Across Managed Language Runtimes. 1806-1818 - Haofeng Li, Chenghang Shi, Jie Lu, Lian Li, Zixuan Zhao:
Module-Aware Context Sensitive Pointer Analysis. 1819-1831 - Guoping Rong, Yongda Yu, Song Liu, Xin Tan, Tianyi Zhang, Haifeng Shen, Jidong Hu:
Code Comment Inconsistency Detection and Rectification Using a Large Language Model. 1832-1843 - Aaron Imani, Iftekhar Ahmed, Mohammad Moshirpour:
Context Conquers Parameters: Outperforming Proprietary Llm in Commit Message Generation. 1844-1856 - Gong Chen, Xiaoyuan Xie, Daniel Tang, Qi Xin, Wenjie Liu:
Hedgecode: A Multi-Task Hedging Contrastive Learning Framework for Code Search. 1857-1868 - Junkai Chen, Zhiyuan Pan, Xing Hu, Zhenhao Li, Ge Li, Xin Xia:
Reasoning Runtime Behavior of a Program with LLM: How Far are We? 1869-1881 - Weisong Sun, Yun Miao, Yuekang Li, Hongyu Zhang, Chunrong Fang, Yi Liu, Gelei Deng, Yang Liu, Zhenyu Chen:
Source Code Summarization in the Era of Large Language Models. 1882-1894 - Kai Huang, Jian Zhang, Xiangxin Meng, Yang Liu:
Template-Guided Program Repair in the Era of Large Language Models. 1895-1907 - Lili Quan, Tianlin Li, Xiaofei Xie, Zhenpeng Chen, Sen Chen, Lingxiao Jiang, Xiaohong Li:
Dissecting Global Search: A Simple Yet Effective Method to Boost Individual Discrimination Testing and Repair. 1908-1920 - Yang Sun, Christopher M. Poskitt, Kun Wang, Jun Sun:
FIXDRIVE: Automatically Repairing Autonomous Vehicle Driving Behaviour for $0.08 per Violation. 1921-1933 - Uwe Gropengießer, Elias Dietz, Florian Brandherm, Achref Doula, Osama Abboud, Xun Xiao, Max Mühlhäuser:
MARQ: Engineering Mission-Critical AI-Based Software with Automated Result Quality Adaptation. 1934-1946 - Jiashuo Zhang, Jiachi Chen, John Grundy, Jianbo Gao, Yanlin Wang, Ting Chen, Zhi Guan, Zhong Chen:
Automated Test Generation For Smart Contracts via On-Chain Test Case Augmentation and Migration. 1947-1959 - Shiyu Sun, Yanhui Li, Lin Chen, Yuming Zhou, Jianhua Zhao:
Boosting Code-line-level Defect Prediction with Spectrum Information and Causality Analysis. 1960-1972 - Yue Wang, Chao Yang, Xiaodong Zhang, Yuwanqi Deng, JianFeng Ma:
DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path Planners. 1973-1985 - Yuyang Rong, Zhanghan Yu, Zhenkai Weng, Stephen Neuendorffer, Hao Chen:
IRFuzzer: Specialized Fuzzing for LLVM Backend Code Generation. 1986-1998 - Shanto Rahman, Bala Naren Chanumolu, Suzzana Rafi, August Shi, Wing Lam:
Ranking Relevant Tests for Order-Dependent Flaky Tests. 1999-2011 - Tianchang Gao, Junjie Chen, Dong Wang, Yile Guo, Yingquan Zhao, Zan Wang:
Selecting Initial Seeds for Better JVM Fuzzing. 2012-2023 - Mengxiao Zhang, Zhenyang Xu, Yongqiang Tian, Xinru Cheng, Chengnian Sun:
Toward a Better Understanding of Probabilistic Delta Debugging. 2024-2035 - Mingyuan Wu, Jiahong Xiang, Kunqiu Chen, Peng Di, Shin Hwei Tan, Heming Cui, Yuqun Zhang:
Tumbling Down the Rabbit Hole: How do Assisting Exploration Strategies Facilitate Grey-Box Fuzzing? 2036-2048 - Houda Naji, Marco Gutfleisch, Alena Naiakshina:
Relationship Status: "It's Complicated" Developer-Security Expert Dynamics in Scrum. 2049-2061 - Daniel Erhabor, Sreeharsha Udayashankar, Meiyappan Nagappan, Samer Al-Kiswany:
Measuring the Runtime Performance of C++ Code Written by Humans Using Github Copilot. 2062-2074 - Ian McCormack, Joshua Sunshine, Jonathan Aldrich:
A Study of Undefined Behavior Across Foreign Function Boundaries in Rust Libraries. 2075-2086 - Cedric Richter, Marek Chalupa, Marie-Christine Jakobs, Heike Wehrheim:
Cooperative Software Verification via Dynamic Program Splitting. 2087-2099 - Mengying Wu, Geng Hong, Wuyuao Mai, Xinyi Wu, Lei Zhang, Yingyuan Pu, Huajun Chai, Lingyun Ying, Haixin Duan, Min Yang:
Exposing the Hidden Layer: Software Repositories in the Service of Seo Manipulation. 2100-2112 - Yiwei Li, Liangze Yin, Wei Dong, Jiaxin Liu, Yanfeng Hu, Shanshan Li:
Hetrify: Efficient Verification of Heterogeneous Programs on RISC-V. 2113-2124 - Shuo Yangt, Xingwei Lin, Jiachi Chen, Qingyuan Zhong, Lei Xiao, Renke Huang, Yanlin Wang, Zibin Zheng:
Hyperion: Unveiling DApp Inconsistencies Using LLM and Dataflow-Guided Symbolic Execution. 2125-2137 - Jingwen Zhang, Zibin Zheng, Yuhong Nan, Mingxi Ye, Kaiwen Ning, Yu Zhang, Weizhe Zhang:
Smartreco: Detecting Read-Only Reentrancy via Fine-Grained Cross-DApp Analysis. 2138-2150 - Nabson Paiva Souza da Silva, Eriky Rodrigues, Tayana Conte:
A Catalog of Micro Frontends Anti-Patterns. 2151-2162 - Chenxing Zhong, Daniel Feitosa, Paris Avgeriou, Huang Huang, Yue Li, He Zhang:
PairSmell: A Novel Perspective Inspecting Software Modular Structure. 2163-2175 - Yuanfang Cai, Lanting He, Jun Qian, Yony Kochinski, Nan Zhang, Ciera Jaspan, Antonio Bianco:
Understanding Architectural Complexity, Maintenance Burden, and Developer Sentiment -A Large-Scale Study. 2176-2187 - Islem Bouzenia, Premkumar Devanbu, Michael Pradel:
RepairAgent: An Autonomous, LLM-Based Agent for Program Repair. 2188-2200 - Qingchao Shen, Yongqiang Tian, Haoyang Ma, Junjie Chen, Lili Huang, Ruifeng Fu, Shing-Chi Cheung, Zan Wang:
A Tale of Two DL Cities: When Library Tests Meet Compiler. 2201-2212 - Li Huang, Weifeng Sun, Meng Yan:
Iterative Generation of Adversarial Example for Deep Code Models. 2213-2224 - Rajdeep Singh Hundal, Yan Xiao, Xiaochun Cao, Jin Song Dong, Manuel Rigger:
On the Mistaken Assumption of Interchangeable Deep Reinforcement Learning Implementations. 2225-2237 - Deepak-George Thomas, Matteo Biagiola, Nargiz Humbatova, Mohammad Wardat, Gunel Jahangirova, Hridesh Rajan, Paolo Tonella:
$\mu \text{PRL}$: A Mutation Testing Pipeline for Deep Reinforcement Learning Based on Real Faults. 2238-2250 - Yiteng Peng, Daoyuan Wu, Zhibo Liu, Dongwei Xiao, Zhenlan Ji, Juergen Rahmel, Shuai Wang:
Testing and Understanding Deviation Behaviors in FHE-Hardened Machine Learning Models. 2251-2263 - Waris Gill, Ali Anwar, Muhammad Ali Gulzar:
TraceFL: Interpretability-Driven Debugging in Federated Learning via Neuron Provenance. 2264-2276 - Qunhong Zeng, Yuxia Zhang, Zhiqing Qiu, Hui Liu:
A First Look at Conventional Commits Classification. 2277-2289 - Salma Begum Tamanna, Gias Uddin, Song Wang, Lan Xia, Longyu Zhang:
Chatgpt Inaccuracy Mitigation During Technical Report Understanding: Are we There Yet? 2290-2302 - Wenchao Gu, Ensheng Shi, Yanlin Wang, Lun Du, Shi Han, Hongyu Zhang, Dongmei Zhang, Michael R. Lyu:
SECRET: Towards Scalable and Efficient Code Retrieval via Segmented Deep Hashing. 2303-2315 - Antu Saha, Oscar Chaparro:
Decoding the Issue Resolution Process in Practice via Issue Report Analysis: a Case Study of Firefox. 2316-2328 - Huaijin Wang, Zhibo Liu, Yanbo Dai, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu:
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements. 2329-2341 - Joseph Romeo, Marco Raglianti, Csaba Nagy, Michele Lanza:
UML is Back. Or is it? Investigating the Past, Present, and Future of UML in Open Source Software. 2342-2354 - Courtney Miller, Mahmoud Jahanshahi, Audris Mockus, Bogdan Vasilescu, Christian Kastner:
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem. 2355-2367 - Hao Zhong:
Understanding Compiler Bugs in Real Development. 2368-2379 - Zachary Karas, Benjamin Gold, Violet Zhou, Noah Reardon, Thad Polk, Catie Chang, Yu Huang:
Studying Programmers Without Programming: Investigating Expertise Using Resting State fMRI. 2380-2392 - Abdul Haddi Amjad, Muhammad Danish, Bless Jah, Muhammad Ali Gulzar:
Accessibility Issues in Ad-Driven Web Applications. 2393-2405 - Enrique Barba Roque, Luis Cruz, Thomas Durieux:
Unveiling the Energy Vampires: A Methodology for Debugging Software Energy Consumption. 2406-2418 - Qiaolin Qin, Heng Li, Ettore Merlo, Maxime Lamothe:
Automated, Unsupervised, and Auto-Parameterized Inference of Data Patterns and Anomaly Detection. 2419-2431 - Shazibul Islam Shamim, Hanyang Hu, Akond Rahman:
On Prescription or Off Prescription? An Empirical Study of Community-Prescribed Security Configurations for Kubernetes. 2432-2444 - Zixuan Tan, Jiayuan Zhou, Xing Hu, Shengyi Pan, Kui Liu, Xin Xia:
Similar but Patched Code Considered Harmful: The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them. 2445-2457 - Youngjae Choi, Seunghoon Woo:
Tiver: Identifying Adaptive Versions of C/C++ Third-Party Open-Source Components Using a Code Clustering Technique. 2458-2469 - Kevin Hermann, Sven Peldszus, Jan-Philipp Steghöfer, Thorsten Berger:
An Exploratory Study on the Engineering of Security Features. 2470-2482 - Mingyue Yuan, Jieshan Chen, Zhenchang Xing, Aaron Quigley, Yuyu Luo, Tianqi Luo, Gelareh Mohammadi, Qinghua Lu, Liming Zhu:
DesignRepair: Dual-Stream Design Guideline-Aware Frontend Repair with Large Language Models. 2483-2494 - Anna Mazhar, Saad Sher Alam, William X. Zheng, Yinfang Chen, Suman Nath, Tianyin Xu:
Fidelity of Cloud Emulators: The Imitation Game of Testing Cloud-Based Software. 2495-2507 - Aleks Chakarov, Jaco Geldenhuys, Matthew Heck, Michael Hicks, Sam Huang, Georges-Axel Jaloyan, Anjali Joshi, K. Rustan M. Leino, Mikael Mayer, Sean McLaughlin, Akhilesh Mritunjai, Clement Pit-Claudel, Sorawee Porncharoenwase, Florian Rabe, Marianna Rapoport, Giles Reger, Cody Roux, Neha Rungta, Robin Salkeld, Matthias Schlaipfer, Daniel Schoepe, Johanna Schwartzentruber, Serdar Tasiran, Aaron Tomb, Emina Torlak, Jean-Baptiste Tristan, Lucas Wagner, Michael W. Whalen, Remy Willems, Tongtong Xiang, Tae Joon Byun, Joshua Cohen, Ruijie Fang, Junyoung Jang, Jakob Rath, Hira Taqdees Syeda, Dominik Wagner, Yongwei Yuan:
Formally Verified Cloud-Scale Authorization. 2508-2521 - Hongyuan Liang, Yue Huang, Tao Chen:
The Same Only Different: On Information Modality for Configuration Performance Analysis. 2522-2534 - Sarah Fakhoury, Markus Kuppe, Shuvendu K. Lahiri, Tahina Ramananandro, Nikhil Swamy:
3DGen: AI-Assisted Generation of Provably Correct Binary Format Parsers. 2535-2547 - Junjielong Xu, Ying Fu, Shin Hwei Tan, Pinjia He:
Aligning the Objective of LLM-Based Program Repair. 2548-2560 - Aidan Z. H. Yang, Sophia Kolak, Vincent Hellendoorn, Ruben Martins, Claire Le Goues:
Revisiting Unnaturalness for Automated Program Repair in the Era of Large Language Models. 2561-2573 - Nikhil Parasaram, Huijie Yan, Boyu Yang, Zineb Flahy, Abriele Qudsi, Damian Ziaber, Earl T. Barr, Sergey Mechtaev:
The Fact Selection Problem in LLM-Based Program Repair. 2574-2586 - Zhijie Wang, Zijie Zhou, Da Song, Yuheng Huang, Shengmai Chen, Lei Ma, Tianyi Zhang:
Towards Understanding the Characteristics of Code Generation Errors Made by Large Language Models. 2587-2599 - Chiming Duan, Yong Yang, Tong Jia, Guiyang Liu, Jinbu Liu, Huxing Zhang, Qi Zhou, Ying Li, Gang Huang:
Famos: Fault Diagnosis for Microservice Systems Through Effective Multi-Modal Data Fusion. 2613-2624 - Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie Williams:
Leveraging Large Language Models to Detect NPM Malicious Packages. 2625-2637 - Yanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein:
MAGIKA: AI-Powered Content-Type Detection. 2638-2649 - Weisong Sun, Yuchen Chen, Mengzhe Yuan, Chunrong Fang, Zhenpeng Chen, Chong Wang, Yang Liu, Baowen Xu, Zhenyu Chen:
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness. 2663-2675 - Beatriz Souza, Michael Pradel:
Treefix: Enabling Execution with a Tree of Prefixes. 2676-2688 - Forough Mehralian, Ziyao He, Sam Malek:
Automated Accessibility Analysis of Dynamic Content Changes on Mobile Apps. 2689-2701 - Chijin Zhou, Quan Zhang, Bingzhou Qian, Yu Jiang:
Janus: Detecting Rendering Bugs in Web Browsers via Visual Delta Consistency. 2702-2713 - Chunhao Dong, Yanjie Jiang, Yuxia Zhang, Yang Zhang, Hui Liu:
Chatgpt-Based Test Generation for Refactoring Engines Enhanced by Feature Analysis on Examples. 2714-2725 - Hanmo You, Zan Wang, Bin Lin, Junjie Chen:
Navigating the Testing of Evolving Deep Learning Systems: An Exploratory Interview Study. 2726-2738 - Chenkai Guo, Qianlu Wang, Naipeng Dong, Lingling Fan, Tianhong Wang, Weijie Zhang, Enbao Chen, Zheli Liu, Lu Yu:
EP-Detector: Automatic Detection of Error-Prone Operation Anomalies in Android Applications. 2739-2750 - Faridah Akinotcho, Lili Wei, Julia Rubin:
Mobile Application Coverage: The 30% Curse and Ways Forward. 2751-2763 - Wuxia Jin, Jiaowei Shang, Jianguo Zheng, Mengjie Sun, Zhenyu Huang, Ming Fan, Ting Liu:
The Design Smells Breaking the Boundary between Android Variants and AOSP. 2764-2776 - Yuxin Zhang, Sen Chen, Xiaofei Xie, Zibo Liu, Lingling Fan:
Scenario-Driven and Context-Aware Automated Accessibility Testing for Android Apps. 2777-2789 - Yanchen Lu, Hongyu Lin, Zehua He, Haitao Xu, Zhao Li, Shuai Hao, Liu Wang, Haoyu Wang, Kui Ren:
TacDroid: Detection of Illicit Apps Through Hybrid Analysis of UI-Based Transition Graphs. 2790-2802 - Menglong Chen, Tian Tan, Minxue Pan, Yue Li:
PacDroid: A Pointer-Analysis-Centric Framework for Security Vulnerabilities in Android Apps. 2803-2815 - Dimitri Kokkonis, Michaël Marcozzi, Emilien Decoux, Stefano Zacchiroli:
ROSA: Finding Backdoors with Fuzzing. 2816-2828 - Mengxia Ren, Anhao Xiang, Chuan Yue:
Analyzing the Feasibility of Adopting Google's Nonce-Based CSP Solutions on Websites. 2829-2840 - Lizhi Liao, Simon Eismann, Heng Li, Cor-Paul Bezemer, Diego Elias Costa, André van Hoorn, Weiyi Shang:
Early Detection of Performance Regressions by Bridging Local Performance Data and Architectural Models. 2841-2853 - Xiaolei Wang, Ruilin Li, Bin Zhang, Chao Feng, Chaojing Tang:
Practical Object-Level Sanitizer with Aggregated Memory Access and Custom Allocator. 2854-2866 - Heng Yong, Zhong Li, Minxue Pan, Tian Zhang, Jianhua Zhao, Xuandong Li:
GVI: Guided Vulnerability Imagination for Boosting Deep Vulnerability Detectors. 2867-2879 - Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang:
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. 2880-2892 - Satyaki Das, Syeda Tasnim Fabiha, Saad Shafiq, Nenad Medvidovic:
Are We Learning the Right Features? A Framework for Evaluating DL-Based Software Vulnerability Detection Solutions. 2893-2904 - Chong Wang, Jianan Liu, Xin Peng, Yang Liu, Yiling Lou:
Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention Inference. 2905-2917 - Minghua He, Tong Jia, Chiming Duan, Huaqian Cai, Ying Li, Gang Huang:
Weakly-Supervised Log-Based Anomaly Detection with Inexact Labels via Multi-Instance Learning. 2918-2930 - Jake Zappin, Trevor Stalnaker, Oscar Chaparro, Denys Poshyvanyk:
When Quantum Meets Classical: Characterizing Hybrid Quantum-Classical Issues Discussed in Developer Forums. 2931-2943 - Sigma Jahan, Mehil B. Shah, Parvez Mahbub, Mohammad Masudur Rahman:
Improved Detection and Diagnosis of Faults in Deep Neural Networks Using Hierarchical and Explainable Classification. 2944-2956 - Sehoon Kim, Yonghyeon Kim, Dahyeon Park, Yuseok Jeon, Jooyong Yi, Mijung Kim:
Lightweight Concolic Testing via Path-Condition Synthesis for Deep Learning Libraries. 2957-2969 - Ruchira Manke, Mohammad Wardat, Foutse Khomh, Hridesh Rajan:
Mock Deep Testing: Toward Separate Development of Data and Models for Deep Learning. 2970-2982 - Xiang Cheng, Fan Sang, Yizhuo Zhai, Xiaokuan Zhang, Taesoo Kim:
Rug: Turbo Llm for Rust Unit Test Generation. 2983-2995 - Mengya Zhang, Preksha Shukla, Wuqi Zhang, Zhuo Zhang, Pranav Agrawal, Zhiqiang Lin, Xiangyu Zhang, Xiaokuan Zhang:
An Empirical Study of Proxy Contracts at the Ethereum Ecosystem Scale. 2996-3008 - Jiashuo Zhang, Yiming Shen, Jiachi Chen, Jianzhong Su, Yanlin Wang, Ting Chen, Jianbo Gao, Zhong Chen:
Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts. 3009-3021 - Yuanhang Zhou, Zhen Yan, Yuanliang Chen, Fuchen Ma, Ting Chen, Yu Jiang:
Chord: Towards a Unified Detection of Blockchain Transaction Parallelism Bugs. 3022-3034 - Zewei Lin, Jiachi Chen, Jiajing Wu, Weizhe Zhang, Zibin Zheng:
Definition and Detection of Centralization Defects in Smart Contracts. 3035-3047 - Wonhoi Kim, Hocheol Nam, Muoi Tran, Amin Jalilov, Zhenkai Liang, Sang Kil Cha, Min Suk Kang:
Fork State-Aware Differential Fuzzing for Blockchain Consensus Implementations. 3048-3059 - Ran Mo, Haopeng Song, Wei Ding, Chaochao Wu:
Code Cloning in Solidity Smart Contracts: Prevalence, Evolution, and Impact on Development. 3060-3071 - Martin Beisel, Johanna Barzen, Frank Leymann, Lavinia Stiliadou, Daniel Vietz, Benjamin Weder:
Pattern-Based Generation and Adaptation of Quantum Workflows. 3072-3084 - Wen Zhang, Botang Xiao, Qingchen Kong, Le Guan, Wenwen Wang:
BSan: A Powerful Identifier-Based Hardware-Independent Memory Error Detector for COTS Binaries. 3085-3096 - Pantazis Deligiannis, Akash Lal, Nikita Mehrotra, Rishi Poddar, Aseem Rastogi:
RustAssistant: Using LLMs to Fix Compilation Errors in Rust Code. 3097-3109 - Kunpeng Zhang, Shuai Wang, Jitao Han, Xiaogang Zhu, Xian Li, Shaohua Wang, Sheng Wen:
Your Fix Is My Exploit: Enabling Comprehensive DL Library API Fuzzing with Large Language Models. 3110-3122 - Yisong Xiao, Aishan Liu, Xinwei Zhang, Tianyuan Zhang, Tianlin Li, Siyuan Liang, Xianglong Liu, Yang Liu, Dacheng Tao:
BDefects4NN: A Backdoor Defect Database for Controlled Localization Studies in Neural Networks. 3123-3135 - Hang Du, Vijay Krishna Palepu, James A. Jones:
Leveraging Propagated Infection to Crossfire Mutants. 3136-3148

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.