


default search action
47th ICSE 2025: Ottawa, ON, Canada
- 47th IEEE/ACM International Conference on Software Engineering, ICSE 2025, Ottawa, ON, Canada, April 26 - May 6, 2025. IEEE 2025, ISBN 979-8-3315-0569-1
- Setu Kumar Basak, K. Virgil English, Ken Ogura, Vitesh Kambara, Bradley Reaves, Laurie A. Williams:
AssetHarvester: A Static Analysis Tool for Detecting Secret-Asset Pairs in Software Artifacts. 1-13 - Xin-Cheng Wen, Zirui Lin, Cuiyun Gao, Hongyu Zhang, Yong Wang, Qing Liao:
Repository-Level Graph Representation Learning for Enhanced Security Patch Detection. 1-13 - Mingfei Cheng, Xiaofei Xie, Yuan Zhou, Junjie Wang, Guozhu Meng, Kairui Yang:
Decictor: Towards Evaluating the Robustness of Decision-Making in Autonomous Driving Systems. 1-13 - Benjamin Steenhoek, Kalpathy Sivaraman, Renata Saldivar Gonzalez, Yevhen Mohylevskyy, Roshanak Zilouchian Moghaddam, Wei Le:
Closing the Gap: A User Study on the Real-world Usefulness of AI-powered Vulnerability Detection & Repair in the IDE. 1-13 - Lezhi Ma, Shangqing Liu, Yi Li, Xiaofei Xie, Lei Bu:
SpecGen: Automated Generation of Formal Program Specifications via Large Language Models. 16-28 - Yizhou Chen, Zeyu Sun, Guoqing Wang, Dan Hao:
Gpass: A Goal-Adaptive Neural Theorem Prover Based on Coq for Automated Formal Verification. 29-41 - Freek Verbeek, Ali Shokri
, Daniel Engel, Binoy Ravindran:
Formally Verified Binary-Level Pointer Analysis. 42-53 - Ziji Wu, Yu Huang, Peishan Huang, Shanghua Wen, Minglong Li, Ji Wang:
EffBT: An Efficient Behavior Tree Reactive Synthesis and Execution Framework. 54-65 - Zhiqing Zhong, Shilin He, Haoxuan Wang, Boxi Yu, Haowen Yang, Pinjia He:
An Empirical Study on Package-Level Deprecation in Python Ecosystem. 66-77 - Qingkai Shi, Xiaoheng Xie, Xianjin Fu, Peng Di, Huawei Li, Ang Zhou, Gang Fan:
Datalog-Based Language-Agnostic Change Impact Analysis for Microservices. 78-89 - Xiafa Wu, Brian Demsky:
GenC2Rust: Towards Generating Generic Rust Code from C. 90-102 - Kevin Guan, Owolabi Legunsen:
Instrumentation-Driven Evolution-Aware Runtime Verification. 103-115 - Jintao Huang, Kai Yang, Gaosheng Wang, Zhiqiang Shi, Zhiwen Pan, Shichao Lv, Limin Sun:
Moye: A Wallbreaker for Monolithic Firmware. 116-128 - Xingyu Wang, Mingsen Wang, Wenbo Shen, Rui Chang:
Understanding and Detecting Peer Dependency Resolving Loop in npm Ecosystem. 129-140 - Xu Chen, Ningning Cui, Zhe Pan, Liwei Chen, Gang Shi, Dan Meng:
Critical Variable State-Aware Directed Greybox Fuzzing. 141-152 - Shiyao Zhou, Jincheng Wang, He Ye, Hao Zhou, Claire Le Goues, Xiapu Luo:
LWDIFF: an LLM-Assisted Differential Testing Framework for Webassembly Runtimes. 153-164 - Gabriel Sherman, Stefan Nagy:
No Harness, No Problem: Oracle-guided Harnessing for Auto-generating C API Fuzzing Harnesses. 165-177 - Matteo Camilli, Raffaela Mirandola:
Parametric Falsification of Many Probabilistic Requirements Under Flakiness. 178-190 - Yang Feng, Zheyuan Lin, Dongchen Zhao, Mengbo Zhou, Jia Liu, James A. Jones:
RediI: Test Infrastructure to Enable Deterministic Reproduction of Failures for Distributed Systems. 191-203 - Syed Fatiul Huq, Mahan Tafreshipour, Kate Kalcevich, Sam Malek:
Automated Generation of Accessibility Test Reports from Recorded User Transcripts. 204-216 - Ben Limpanukorn, Jiyuan Wang, Hong Jin Kang, Eric Zitong Zhou, Miryung Kim:
Fuzzing MLIR Compilers with Custom Mutation Synthesis. 217-229 - Zexiang Zhang, Gaoning Pan, Ruipeng Wang, Yiming Tao, Zulie Pan, Cheng Tu, Min Zhang, Yang Li, Yi Shen, Chunming Wu:
Insvdf: Interface-State-Aware Virtual Device Fuzzing. 230-241 - Shihao Zhu, Yuqi Guo, Yan Cai, Bin Liang, Long Zhang, Rui Chen, Tingting Yu:
Reduce Dependence for Sound Concurrency Bug Prediction. 242-254 - Ziqiao Kong, Shaohua Li, Heqing Huang, Zhendong Su:
Sand: Decoupling Sanitization from Fuzzing for Low Overhead. 255-267 - Siyuan Li, Yuekang Li, Zuxin Chen, Chaopeng Dong, Yongpan Wang, Hong Li, Yongle Chen, Hongsong Zhu:
TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability Code. 268-280 - Tianchen Yu, Li Yuan, Liannan Lin, Hongkui He:
A Multiple Representation Transformer with Optimized Abstract Syntax Tree for Efficient Code Clone Detection. 281-293 - Cho-Ting Lee, Andrew Neeser, Shengzhe Xu, Jay Katyan, Patrick Cross, Sharanya Pathakota, Marigold Norman, John Simeone, Jaganmohan Chandrasekaran, Naren Ramakrishnan:
Can an LLM Find Its Way Around a Spreadsheet? 294-306 - Alex Sanchez-Stern, Abhishek Varghese, Zhanna Kaufman, Shizhuo Dylan Zhang, Talia Ringer, Yuriy Brun
:
QEDCartographer: Automating Formal Verification Using Reward-Free Reinforcement Learning. 307-320 - Chong Wang, Jian Zhang, Yiling Lou, Mingwei Liu, Weisong Sun, Yang Liu, Xin Peng:
TIGER: A Generating-Then-Ranking Framework for Practical Python Type Inference. 321-333 - Xue Jiang, Yihong Dong, Yongding Tao, Huanyu Liu, Zhi Jin, Ge Li:
ROCODE: Integrating Backtracking Mechanism and Program Analysis in Large Language Models for Code Generation. 334-346 - Kyle Thompson, Nuno Saavedra, Pedro Carrott, Kevin Fisher, Alex Sanchez-Stern, Yuriy Brun
, João F. Ferreira, Sorin Lerner, Emily First:
Rango: Adaptive Retrieval-Augmented Proving for Automated Software Verification. 347-359 - Trey Woodlief, Carl Hildebrandt, Sebastian G. Elbaum:
A Differential Testing Framework to Identify Critical AV Failures Leveraging Arbitrary Inputs. 360-372 - Shuai Wang, Yinan Yu, Robert Feldt, Dhasarathy Parthasarathy:
Automating a Complete Software Test Process Using LLMs: An Automotive Case Study. 373-384 - Venkata Sai Aswath Duvvuru, Bohan Zhang, Michael Vierhauser, Ankit Agrawal:
LLM-Agents Driven Automated Simulation Testing and Analysis of small Uncrewed Aerial Systems. 385-397 - Luciano Baresi, Davide Yi Xian Hu, Andrea Stocco, Paolo Tonella:
Efficient Domain Augmentation for Autonomous Driving Testing Using Diffusion Models. 398-410 - Linfeng Liang, Yao Deng, Kye Morton, Valtteri Kallinen, Alice James, Avishkar Seth, Endrowednes Kuantama, Subhas Mukhopadhyay, Richard Han, Xi Zheng:
GARL: Genetic Algorithm-Augmented Reinforcement Learning to Detect Violations in Marker-Based Autonomous Landing Systems. 411-423 - Ali Ebrahimi Pourasad, Walid Maalej:
Does GenAI Make Usability Testing Obsolete? 437-449 - Parsa Alian, Noor Nashid, Mobina Shahbandeh, Taha Shabani, Ali Mesbah:
Feature-Driven End-to-End Test Generation. 450-462 - Dehai Zhao, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu:
SeeAction: Towards Reverse Engineering How-What-Where of HCI Actions from Screencasts for UI Automation. 463-475 - Qikang Liu, Yang He, Yanwen Cai, Byeongguk Kwak, Yuepeng Wang:
Synthesizing Document Database Queries Using Collection Abstractions. 476-488 - Boqi Chen, José Antonio Hernández López, Gunter Mussbacher, Dániel Varró:
The Power of Types: Exploring the Impact of Type Checking on Neural Bug Detection in Dynamically Typed Languages. 489-501 - Shiyu Zhang, Haoyang Song, Qixin Wang, Henghua Shen, Yu Pei:
A Test Oracle for Reinforcement Learning Software Based on Lyapunov Stability Control Theory. 502-513 - Ravishka Rathnasuriya, Zijie Zhao, Wei Yang:
CodeImprove: Program Adaptation for Deep Code Models. 514-526 - Brian Hyeongseok Kim, Jingbo Wang, Chao Wang:
Fairquant: Certifying and Quantifying Fairness of Deep Neural Networks. 527-539 - Claudio Spiess, David Gros, Kunal Suresh Pai, Michael Pradel, Md. Rafiqul Islam Rabin, Amin Alipour, Susmit Jha, Prem Devanbu, Toufique Ahmed:
Calibration and Correctness of Language Models for Code. 540-552 - Yifan Wu, Yunpeng Wang, Ying Li, Wei Tao, Siyu Yu, Haowen Yang, Wei Jiang, Jianguo Li:
An Empirical Study on Commit Message Generation Using LLMs via In-Context Learning. 553-565 - Tanghaoran Zhang, Yue Yu, Xinjun Mao, Shangwen Wang, Kang Yang, Yao Lu, Zhang Zhang, Yuxin Zhao:
Instruct or Interact? Exploring and Eliciting LLMs' Capability in Code Snippet Adaptation Through Prompt Engineering. 566-577 - Shuzheng Gao, Cuiyun Gao, Wenchao Gu, Michael R. Lyu:
Search-Based LLMs for Code Optimization. 578-590 - Yubo Mai, Zhipeng Gao, Haoye Wang, Tingting Bi, Xing Hu, Xin Xia, Jianling Sun:
Towards Better Answers: Automated Stack Overflow Post Updating. 591-603 - Yuanliang Zhang, Yifan Xie, Shanshan Li, Ke Liu, Chong Wang, Zhouyang Jia, Xiangbing Huang, Jie Song, Chaopeng Luo, Zhizheng Zheng, Rulin Xu, Yitong Liu, Si Zheng, Xiangke Liao:
Unseen Horizons: Unveiling the Real Capability of LLM Code Generation Beyond the Familiar. 604-615 - Jinan Jiang, Xinghao Peng, Jinzhao Chu, Xiapu Luo:
ConsCS: Effective and Efficient Verification of Circom Circuits. 616-628 - Changjian Zhang, Parv Kapoor, Ian Dardik, Leyi Cui, Rômulo Meira-Góes, David Garlan, Eunsuk Kang:
Constrained LTL Specification Learning from Examples. 629-641 - Ziyu Mao, Jingyi Wang, Jun Sun, Shengchao Qin, Jiawen Xiong:
LLM-Aided Automatic Modeling for Security Protocol Verification. 642-654 - Ying Fu, Zhiyong Wu, Yuanliang Zhang, Jie Liang, Jingzhou Fu, Yu Jiang, Shanshan Li, Xiangke Liao:
Thanos: DBMS Bug Detection via Storage Engine Rotation Based Differential Testing. 655-666 - Wenqian Deng, Jie Liang, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Yu Jiang:
Coni: Detecting Database Connector Bugs via State-Aware Test Case Generation. 667-678 - Zhiyong Wu, Jie Liang, Jingzhou Fu, Mingzhe Wang, Yu Jiang:
PUPPY: Finding Performance Degradation Bugs in DBMSs via Limited-Optimization Plan Construction. 679-690 - Chun Li, Hui Li, Zhong Li, Minxue Pan, Xuandong Li:
Enhancing Fault Localization in Industrial Software Systems via Contrastive Learning. 691-703 - Yueke Zhang, Anda Liang, Xiaohan Wang, Pamela J. Wisniewski, Fengwei Zhang, Kevin Leach, Yu Huang:
Who's Pushing the Code? An Exploration of GitHub Impersonation. 704-716 - Bianca Trinkenreich, Zixuan Feng, Rudrajit Choudhuri, Marco Aurélio Gerosa, Anita Sarma, Igor Steinmacher:
Investigating the Impact of Interpersonal Challenges on Feeling Welcome in OSS. 717-729 - Shide Zhou, Tianlin Li, Kailong Wang, Yihao Huang, Ling Shi, Yang Liu, Haoyu Wang:
Understanding the Effectiveness of Coverage Criteria for Large Language Models: A Special Angle from Jailbreak Attacks. 730-742 - Zhenpeng Chen, Xinyue Li, Jie M. Zhang, Federica Sarro, Yang Liu:
Diversity Drives Fairness: Ensemble of Higher Order Mutants for Intersectional Fairness of Machine Learning Software. 743-755 - Lingfeng Zhang, Zhaohui Wang, Yueling Zhang, Min Zhang, Jiangtao Wang:
HIFI: Explaining and Mitigating Algorithmic Bias Through the Lens of Game-Theoretic Interactions. 756-768 - Yanfu Yan, Viet Duong, Huajie Shao, Denys Poshyvanyk:
Towards More Trustworthy Deep Code Models by Enabling Out-of-Distribution Detection. 769-781 - Yining She, Sumon Biswas, Christian Kästner, Eunsuk Kang:
FairSense: Long-Term Fairness Analysis of ML-Enabled Systems. 782-794 - Sanan Hasanov, Stefan Nagy, Paul Gazzillo:
A Little Goes a Long Way: Tuning Configuration Selection for Continuous Kernel Fuzzing. 795-807 - Yesugen Baatartogtokh, Kaitlyn Cook, Alicia M. Grubb:
Exploring the Robustness of the Effect of EVO on Intention Valuation Through Replication. 808-820 - Francisco Cirelli, Dalal Alrajeh, Sebastián Uchitel:
Unavoidable Boundary Conditions: a Control Perspective on Goal Conflicts. 821-832 - Bimpe Ayoola, Miikka Kuutila, Rina R. Wehbe, Paul Ralph:
User Personas Improve Social Sustainability by Encouraging Software Developers to Deprioritize Antisocial Features. 833-845 - Georgios Sakkas, Pratyush Sahu, Kyeling Ong, Ranjit Jhala:
Neurosymbolic Modular Refinement Type Inference. 846-858 - Hyunjae Suh, Mahan Tafreshipour, Jiawei Li, Adithya Bhattiprolu, Iftekhar Ahmed:
An Empirical Study on Automatically Detecting AI-Generated Source Code: How Far are We? 859-871 - Smit Patel, Aashish Yadavally, Hridya Dhulipala, Tien N. Nguyen:
Planning a Large Language Model for Static Detection of Runtime Errors in Code Snippets. 872-884 - Chong Wang, Kaifeng Huang, Jian Zhang, Yebo Feng, Lyuye Zhang, Yang Liu, Xin Peng:
LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-Based Code Completion. 885-897 - Shuyin Ouyang, Jie M. Zhang, Zeyu Sun, Albert Meroño-Peñuela:
Knowledge-Enhanced Program Repair for Data Science Code. 898-910 - Wenwei Gu, Jiazhen Gu, Jinyang Liu, Zhuangbin Chen, Jianping Zhang, Jinxi Kuang, Cong Feng, Yongqiang Yang, Michael R. Lyu:
ADAMAS: Adaptive Domain-Aware Performance Anomaly Detection in Cloud Service Systems. 911-923 - Zeyang Ma, Dong Jae Kim, Tse-Hsun Peter Chen:
LibreLog: Accurate and Efficient Unsupervised Log Parsing Using Open-Source Large Language Models. 924-936 - Xiaopeng Li, Shangwen Wang, Shasha Li, Jun Ma, Jie Yu, Xiaodong Liu, Jing Wang, Bin Ji, Weimin Zhang:
Model Editing for LLMs4Code: How Far are we? 937-949 - Christof Tinnes, Alisa Welter, Sven Apel:
Software Model Evolution with Large Language Models: Experiments on Simulated, Public, and Industrial Datasets. 950-962 - Haifeng Ruan, Yuntong Zhang, Abhik Roychoudhury:
SpecRover: Code Intent Extraction via LLMs. 963-974 - Van-Hoang Le, Yi Xiao, Hongyu Zhang:
Unleashing the True Potential of Semantic-Based Log Parsing with Pre-Trained Language Models. 975-987 - Youpeng Ma, Tao Chen, Ke Li:
Faster Configuration Performance Bug Testing with Neural Dual-Level Prioritization. 988-1000 - Annibale Panichella:
Metamorphic-Based Many-Objective Distillation of LLMs for Code-Related Tasks. 1001-1013 - Kaiyao Ke:
NIODebugger: A Novel Approach to Repair Non-Idempotent-Outcome Tests with LLM-Based Agent. 1014-1025 - Zifan Nan, Zhaoqiang Guo, Kui Liu, Xin Xia:
Test Intention Guided LLM-Based Unit Test Generation. 1026-1038 - Xin Yin, Chao Ni, Xiaodan Xu, Xiaohu Yang:
What You See is What You Get: Attention-Based Self-Guided Automatic Unit Test Generation. 1039-1051 - Giacomo Benedetti, Oreofe Solarin, Courtney Miller, Greg Tystahl, William Enck, Christian Kästner, Alexandros Kapravelos, Alessio Merlo, Luca Verderame:
An Empirical Study on Reproducible Packaging in Open-Source Ecosystems. 1052-1063 - Miao Miao, Austin Mordahl, Dakota Soles, Alice Beideck, Shiyi Wei:
An Extensive Empirical Study of Nondeterministic Behavior in Static Analysis Tools. 1064-1076 - Madeline Janecek, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj:
Execution Trace Reconstruction Using Diffusion-Based Generative Models. 1077-1088 - Chenxi Zhang, Yufei Liang, Tian Tan, Chang Xu, Shuangxiang Kan, Yulei Sui, Yue Li:
Interactive Cross-Language Pointer Analysis for Resolving Native Code in Java Programs. 1089-1100 - Baoquan Cui, Rong Qu, Zhen Tang, Jian Zhang:
Static Analysis of Remote Procedure Call in Java Programs. 1101-1113 - Aashish Yadavally, Xiaokai Rong, Phat Nguyen, Tien N. Nguyen:
Large Language Models for Safe Minimization. 1114-1126 - Qi Guo, Xiaofei Xie, Shangqing Liu, Ming Hu, Xiaohong Li, Lei Bu:
Intention is All you Need: Refining your Code from your Intention. 1127-1139 - Yanlin Wang, Yanli Wang, Daya Guo, Jiachi Chen, Ruikai Zhang, Yuchi Ma, Zibin Zheng:
RLCoder: Reinforcement Learning for Repository-Level Code Completion. 1140-1152 - Marcos Macedo, Yuan Tian, Pengyu Nie, Filipe Roseiro Côgo, Bram Adams:
INTERTRANS: Leveraging Transitive Intermediate Translations to Enhance LLM-Based Code Translation. 1153-1164 - Yorick Sens, Henriette Knopp, Sven Peldszus, Thorsten Berger:
A Large-Scale Study of Model Integration in ML-Enabled Software Systems. 1165-1177 - Yuchen Shao, Yuheng Huang, Jiawei Shen, Lei Ma, Ting Su, Chengcheng Wan:
Are LLMs Correctly Integrated into Software Systems? 1178-1190 - Zhiming Chi, Jianan Ma, Pengfei Yang, Cheng-Chao Huang, Renjue Li, Jingyi Wang, Xiaowe Huang, Lijun Zhang:
Patch Synthesis for Property Repair of Deep Neural Networks. 1191-1203 - Zeinabsadat Saghi, Thomas Zimmermann, Souti Chattopadhyay:
Code Today, Deadline Tomorrow: Procrastination Among Software Developers. 1204-1216 - Kaia Newman, Sarah Snay, Madeline Endres, Manasvi Parikh, Andrew Begel:
"Get Me in the Groove": a Mixed Methods Study on Supporting Adhd Professional Programmers. 1217-1229 - Ruchit Rawal, Victor-Alexandru Padurean, Sven Apel, Adish Singla, Mariya Toneva:
Hints Help Finding and Fixing Bugs Differently in Python and Text-Based Program Representations. 1230-1242 - Ruanqianqian (Lisa) Huang, Savitha Ravi, Michael He, Boyu Tian, Sorin Lerner, Michael Coblenz:
How Scientists Use Jupyter Notebooks: Goals, Quality Attributes, and Opportunities. 1243-1255 - Seongmin Lee, Shreyas Minocha
, Marcel Böhme:
Accounting for Missing Events in Statistical Information Leakage Analysis. 1256-1267 - Hao Song, Teng Li, Jiachi Chen, Ting Chen, Beibei Li, Zhangyan Lin, Yi Lu, Pan Li, Xihan Zhou:
Enhancing the Open Network: Definition and Automated Detection of Smart Contract Defects. 1281-1293 - Paschal C. Amusuo, Kyle A. Robinson, Tanmay Singla, Huiyun Peng, Aravind Machiry, Santiago Torres-Arias, Laurent Simon, James C. Davis:
$ZTD_{\text{JAVA}}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies. 1294-1306 - Yi Sun, Zhuo Zhang, Xiangyu Zhang:
FairChecker: Detecting Fund-Stealing Bugs in DeFi Protocols via Fairness Validation. 1307-1319 - Fraol Batole, David O'Brien, Tien N. Nguyen, Robert Dyer, Hridesh Rajan:
An LLM-Based Agent-Oriented Approach for Automated Code Design Issue Localization. 1320-1332 - Yulong Ye, Tao Chen, Miqing Li:
Distilled Lifelong Self-Adaptation for Configurable Systems. 1333-1345 - Yichen Li, Yulun Wu, Jinyang Liu, Zhihan Jiang, Zhuangbin Chen, Guangba Yu, Michael R. Lyu:
COCA: Generative Root Cause Analysis for Distributed Systems with Code Knowledge. 1346-1358 - Yifeng Di, Tianyi Zhang:
Enhancing Code Generation via Bidirectional Comment-Level Mutual Grounding. 1359-1371 - Dewu Zheng, Yanlin Wang, Ensheng Shi, Ruikai Zhang, Yuchi Ma, Hongyu Zhang, Zibin Zheng:
HumanEvo: An Evolution-Aware Benchmark for More Realistic Evaluation of Repository-Level Code Generation. 1372-1384 - Stefan Schwedt
, Thomas Ströder:
From Bugs to Benefits: Improving User Stories by Leveraging Crowd Knowledge with CrUISE-AC. 1385-1395 - Dominik Fuchß
, Tobias Hey
, Jan Keim
, Haoyu Liu
, Niklas Ewald
, Tobias Thirolf
, Anne Koziolek
:
LiSSA: Toward Generic Traceability Link Recovery Through Retrieval- Augmented Generation. 1396-1408 - Myeongsoo Kim, Tyler Stennett, Saurabh Sinha, Alessandro Orso:
A Multi-Agent Approach for REST API Testing with Semantic Graphs and LLM-Driven Inputs. 1409-1421 - Hongyan Gao, Yibiao Yang, Maolin Sun, Jiangchang Wu, Yuming Zhou, Baowen Xu:
Clozemaster: Fuzzing Rust Compiler by Harnessing Llms for Infilling Masked Real Programs. 1422-1435 - Jiageng Li, Zhen Dong, Chong Wang, Haozhen You, Cen Zhang, Yang Liu, Xin Peng:
LLM Based Input Space Partitioning Testing for Library APIs. 1436-1448 - Amirhossein Deljouyi, Roham Koohestani, Maliheh Izadi, Andy Zaidman:
Leveraging Large Language Models for Enhancing the Understandability of Generated Unit Tests. 1449-1461 - Jiyang Zhang, Yu Liu, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
exLong: Generating Exceptional Behavior Tests with Large Language Models. 1462-1474 - Soneya Binta Hossain, Matthew B. Dwyer:
TOGLL: Correct and Strong Test Oracle Generation with LLMS. 1475-1487 - Tajkia Rahman Toma, Balreet Grewal, Cor-Paul Bezemer:
Answering User Questions About Machine Learning Models Through Standardized Model Cards. 1488-1500 - Verya Monjezi, Ashutosh Trivedi, Vladik Kreinovich, Saeid Tizpaz-Niari:
Fairness Testing Through Extreme Value Theory. 1501-1513 - Zhao Tian, Junjie Chen, Xiangyu Zhang:
Fixing Large Language Models' Specification Misunderstanding for Better Code Generation. 1514-1526 - Feng Lin, Dong Jae Kim, Tse-Hsun Chen:
SOEN-101: Code Generation by Emulating Software Process Models Using Large Language Model Agents. 1527-1539 - Nadia Nahar, Haoran Zhang, Grace A. Lewis, Shurui Zhou, Christian Kästner:
The Product Beyond the Model - An Empirical Study of Repositories of Open-Source ML Products. 1540-1552 - Geraldine Galindo-Gutierrez
, Juan Pablo Sandoval Alcocer, Nicolas Jimenez-Fuentes, Alexandre Bergel, Gordon Fraser:
Increasing the Effectiveness of Automatically Generated Tests by Improving Class Observability. 1553-1565 - Octavio Galland, Marcel Böhme:
Invivo Fuzzing by Amplifying Actual Executions. 1566-1578 - Chuan Luo, Shuangyu Lyu, Wei Wu, Hongyu Zhang, Dianhui Chu, Chunming Hu:
Towards High-Strength Combinatorial Interaction Testing for Highly Configurable Software Systems. 1579-1591 - Xintong Zhou, Zhenyang Xu, Mengxiao Zhang, Yongqiang Tian, Chengnian Sun:
WDD: Weighted Delta Debugging. 1592-1603 - Jaehyeok Lee, Sooyoung Cha:
Topseed: Learning Seed Selection Strategies for Symbolic Execution from Scratch. 1604-1615 - Zhiyuan Li, Jingzheng Wu, Xiang Ling, Tianyue Luo, Zhiqing Rui, Yanjun Wu:
The Seeds of the Future Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries. 1616-1627 - Yuling Shi, Hongyu Zhang, Chengcheng Wan, Xiaodong Gu:
Between Lines of Code: Unraveling the Distinct Patterns of Machine and Human Programmers. 1628-1639 - Rosalia Tufano, Alberto Martin-Lopez, Ahmad Tayeb, Ozren Dabic, Sonia Haiduc, Gabriele Bavota:
Deep Learning-based Code Reviews: A Paradigm Shift or a Double-Edged Sword? 1640-1652 - Luís F. Gomes, Vincent J. Hellendoorn, Jonathan Aldrich, Rui Abreu:
An Exploratory Study of ML Sketches and Visual Code Assistants. 1653-1664 - Weiwei Xu, Kai Gao, Hao He, Minghui Zhou:
Licoeval: Evaluating LLMs on License Compliance in Code Generation. 1665-1677 - Sadra Sabouri, Philipp Eibl, Xinyi Zhou, Morteza Ziyadi, Nenad Medvidovic, Lars Lindemann, Souti Chattopadhyay:
Trust Dynamics in AI-Assisted Development: Definitions, Factors, and Implications. 1678-1690 - Rudrajit Choudhuri, Bianca Trinkenreich, Rahul Pandita, Eirini Kalliamvakou, Igor Steinmacher, Marco Aurélio Gerosa, Christopher Sanchez, Anita Sarma:
What Guides Our Choices? Modeling Developers' Trust and Behavioral Intentions Towards Genai. 1691-1703 - Xinyu Lian, Yinfang Chen, Runxiang Cheng, Jie Huang, Parth Thakkar, Minjia Zhang, Tianyin Xu:
Large Language Models as Configuration Validators. 1704-1716 - Nausheen Mohammed, Akash Lal, Aseem Rastogi, Rahul Sharma, Subhajit Roy:
LLM Assistance for Memory Safety. 1717-1728 - Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David A. Wagner, Baishakhi Ray, Yizheng Chen:
Vulnerability Detection with Code Language Models: How Far are We? 1729-1741 - Wei Ma, Daoyuan Wu, Yuqiang Sun, Tianwen Wang, Shangqing Liu, Jian Zhang, Yue Xue, Yang Liu:
Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications. 1742-1754 - Saikat Chakraborty, Gabriel Ebner, Siddharth Bhat, Sarah Fakhoury, Sakina Fatima, Shuvendu K. Lahiri, Nikhil Swamy:
Towards Neural Synthesis for SMT-Assisted Proof-Oriented Programming. 1755-1767 - Rodrigo Pedro, Miguel E. Coimbra
, Daniel Castro
, Paulo Carreira, Nuno Santos:
Prompt-to-SQL Injections in LLM-Integrated Web Applications: Risks and Defenses. 1768-1780 - Yongchao Wang, Yuandao Cai, Charles Zhang:
Boosting Path-Sensitive Value Flow Analysis Via Removal of Redundant Summaries. 1781-1792 - Taha Shabani, Noor Nashid, Parsa Alian, Ali Mesbah:
Dockerfile Flakiness: Characterization and Repair. 1793-1805 - Yicheng Wang, Wensheng Dou, Yu Liang, Yi Wang, Wei Wang, Jun Wei, Tao Huang:
Evaluating Garbage Collection Performance Across Managed Language Runtimes. 1806-1818 - Haofeng Li, Chenghang Shi, Jie Lu, Lian Li, Zixuan Zhao:
Module-Aware Context Sensitive Pointer Analysis. 1819-1831 - Guoping Rong, Yongda Yu, Song Liu, Xin Tan, Tianyi Zhang, Haifeng Shen, Jidong Hu:
Code Comment Inconsistency Detection and Rectification Using a Large Language Model. 1832-1843 - Aaron Imani, Iftekhar Ahmed, Mohammad Moshirpour:
Context Conquers Parameters: Outperforming Proprietary Llm in Commit Message Generation. 1844-1856 - Gong Chen, Xiaoyuan Xie, Daniel Tang, Qi Xin, Wenjie Liu:
Hedgecode: A Multi-Task Hedging Contrastive Learning Framework for Code Search. 1857-1868 - Junkai Chen, Zhiyuan Pan, Xing Hu, Zhenhao Li, Ge Li, Xin Xia:
Reasoning Runtime Behavior of a Program with LLM: How Far are We? 1869-1881 - Weisong Sun, Yun Miao, Yuekang Li, Hongyu Zhang, Chunrong Fang, Yi Liu, Gelei Deng, Yang Liu, Zhenyu Chen:
Source Code Summarization in the Era of Large Language Models. 1882-1894 - Kai Huang, Jian Zhang, Xiangxin Meng, Yang Liu
:
Template-Guided Program Repair in the Era of Large Language Models. 1895-1907 - Lili Quan, Tianlin Li, Xiaofei Xie, Zhenpeng Chen, Sen Chen, Lingxiao Jiang, Xiaohong Li:
Dissecting Global Search: A Simple Yet Effective Method to Boost Individual Discrimination Testing and Repair. 1908-1920 - Yang Sun, Christopher M. Poskitt
, Kun Wang, Jun Sun:
FIXDRIVE: Automatically Repairing Autonomous Vehicle Driving Behaviour for $0.08 per Violation. 1921-1933 - Uwe Gropengießer, Elias Dietz, Florian Brandherm, Achref Doula, Osama Abboud, Xun Xiao, Max Mühlhäuser:
MARQ: Engineering Mission-Critical AI-Based Software with Automated Result Quality Adaptation. 1934-1946 - Jiashuo Zhang, Jiachi Chen, John Grundy, Jianbo Gao, Yanlin Wang, Ting Chen, Zhi Guan, Zhong Chen:
Automated Test Generation For Smart Contracts via On-Chain Test Case Augmentation and Migration. 1947-1959 - Shiyu Sun, Yanhui Li, Lin Chen, Yuming Zhou, Jianhua Zhao:
Boosting Code-line-level Defect Prediction with Spectrum Information and Causality Analysis. 1960-1972 - Yue Wang, Chao Yang, Xiaodong Zhang, Yuwanqi Deng, JianFeng Ma:
DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path Planners. 1973-1985 - Yuyang Rong, Zhanghan Yu, Zhenkai Weng, Stephen Neuendorffer, Hao Chen:
IRFuzzer: Specialized Fuzzing for LLVM Backend Code Generation. 1986-1998 - Shanto Rahman, Bala Naren Chanumolu, Suzzana Rafi, August Shi, Wing Lam:
Ranking Relevant Tests for Order-Dependent Flaky Tests. 1999-2011 - Tianchang Gao, Junjie Chen, Dong Wang, Yile Guo, Yingquan Zhao, Zan Wang:
Selecting Initial Seeds for Better JVM Fuzzing. 2012-2023 - Mengxiao Zhang, Zhenyang Xu, Yongqiang Tian, Xinru Cheng, Chengnian Sun:
Toward a Better Understanding of Probabilistic Delta Debugging. 2024-2035 - Mingyuan Wu, Jiahong Xiang, Kunqiu Chen, Peng Di, Shin Hwei Tan, Heming Cui, Yuqun Zhang:
Tumbling Down the Rabbit Hole: How do Assisting Exploration Strategies Facilitate Grey-Box Fuzzing? 2036-2048 - Houda Naji, Marco Gutfleisch, Alena Naiakshina:
Relationship Status: "It's Complicated" Developer-Security Expert Dynamics in Scrum. 2049-2061 - Daniel Erhabor, Sreeharsha Udayashankar, Meiyappan Nagappan, Samer Al-Kiswany:
Measuring the Runtime Performance of C++ Code Written by Humans Using Github Copilot. 2062-2074 - Ian McCormack, Joshua Sunshine, Jonathan Aldrich:
A Study of Undefined Behavior Across Foreign Function Boundaries in Rust Libraries. 2075-2086 - Cedric Richter, Marek Chalupa, Marie-Christine Jakobs, Heike Wehrheim:
Cooperative Software Verification via Dynamic Program Splitting. 2087-2099 - Mengying Wu, Geng Hong, Wuyuao Mai
, Xinyi Wu, Lei Zhang, Yingyuan Pu, Huajun Chai, Lingyun Ying, Haixin Duan, Min Yang:
Exposing the Hidden Layer: Software Repositories in the Service of Seo Manipulation. 2100-2112 - Yiwei Li, Liangze Yin, Wei Dong, Jiaxin Liu, Yanfeng Hu, Shanshan Li:
Hetrify: Efficient Verification of Heterogeneous Programs on RISC-V. 2113-2124 - Shuo Yangt, Xingwei Lin, Jiachi Chen, Qingyuan Zhong, Lei Xiao, Renke Huang, Yanlin Wang, Zibin Zheng:
Hyperion: Unveiling DApp Inconsistencies Using LLM and Dataflow-Guided Symbolic Execution. 2125-2137 - Jingwen Zhang, Zibin Zheng, Yuhong Nan, Mingxi Ye, Kaiwen Ning, Yu Zhang, Weizhe Zhang:
Smartreco: Detecting Read-Only Reentrancy via Fine-Grained Cross-DApp Analysis. 2138-2150 - Nabson Paiva Souza da Silva, Eriky Rodrigues, Tayana Conte:
A Catalog of Micro Frontends Anti-Patterns. 2151-2162 - Chenxing Zhong, Daniel Feitosa, Paris Avgeriou, Huang Huang, Yue Li
, He Zhang:
PairSmell: A Novel Perspective Inspecting Software Modular Structure. 2163-2175 - Yuanfang Cai, Lanting He, Jun Qian, Yony Kochinski, Nan Zhang, Ciera Jaspan, Antonio Bianco:
Understanding Architectural Complexity, Maintenance Burden, and Developer Sentiment -A Large-Scale Study. 2176-2187 - Islem Bouzenia, Premkumar T. Devanbu, Michael Pradel:
RepairAgent: An Autonomous, LLM-Based Agent for Program Repair. 2188-2200 - Qingchao Shen
, Yongqiang Tian, Haoyang Ma, Junjie Chen, Lili Huang, Ruifeng Fu, Shing-Chi Cheung, Zan Wang:
A Tale of Two DL Cities: When Library Tests Meet Compiler. 2201-2212 - Li Huang, Weifeng Sun, Meng Yan:
Iterative Generation of Adversarial Example for Deep Code Models. 2213-2224 - Rajdeep Singh Hundal, Yan Xiao, Xiaochun Cao, Jin Song Dong, Manuel Rigger:
On the Mistaken Assumption of Interchangeable Deep Reinforcement Learning Implementations. 2225-2237 - Deepak-George Thomas, Matteo Biagiola, Nargiz Humbatova, Mohammad Wardat, Gunel Jahangirova, Hridesh Rajan, Paolo Tonella:
$\mu \text{PRL}$: A Mutation Testing Pipeline for Deep Reinforcement Learning Based on Real Faults. 2238-2250 - Yiteng Peng, Daoyuan Wu, Zhibo Liu, Dongwei Xiao, Zhenlan Ji, Juergen Rahmel, Shuai Wang:
Testing and Understanding Deviation Behaviors in FHE-Hardened Machine Learning Models. 2251-2263 - Waris Gill, Ali Anwar, Muhammad Ali Gulzar:
TraceFL: Interpretability-Driven Debugging in Federated Learning via Neuron Provenance. 2264-2276 - Qunhong Zeng, Yuxia Zhang, Zhiqing Qiu, Hui Liu:
A First Look at Conventional Commits Classification. 2277-2289 - Salma Begum Tamanna, Gias Uddin, Song Wang, Lan Xia, Longyu Zhang:
Chatgpt Inaccuracy Mitigation During Technical Report Understanding: Are we There Yet? 2290-2302 - Wenchao Gu, Ensheng Shi, Yanlin Wang, Lun Du, Shi Han, Hongyu Zhang, Dongmei Zhang, Michael R. Lyu:
SECRET: Towards Scalable and Efficient Code Retrieval via Segmented Deep Hashing. 2303-2315 - Antu Saha, Oscar Chaparro:
Decoding the Issue Resolution Process in Practice via Issue Report Analysis: a Case Study of Firefox. 2316-2328 - Huaijin Wang, Zhibo Liu, Yanbo Dai, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu:
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements. 2329-2341 - Joseph Romeo, Marco Raglianti, Csaba Nagy, Michele Lanza:
UML is Back. Or is it? Investigating the Past, Present, and Future of UML in Open Source Software. 2342-2354 - Courtney Miller, Mahmoud Jahanshahi, Audris Mockus, Bogdan Vasilescu, Christian Kästner:
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem. 2355-2367 - Hao Zhong:
Understanding Compiler Bugs in Real Development. 2368-2379 - Zachary Karas, Benjamin Gold, Violet Zhou, Noah Reardon, Thad Polk, Catie Chang, Yu Huang:
Studying Programmers Without Programming: Investigating Expertise Using Resting State fMRI. 2380-2392 - Abdul Haddi Amjad, Muhammad Danish, Bless Jah, Muhammad Ali Gulzar:
Accessibility Issues in Ad-Driven Web Applications. 2393-2405 - Enrique Barba Roque, Luis Cruz, Thomas Durieux:
Unveiling the Energy Vampires: A Methodology for Debugging Software Energy Consumption. 2406-2418 - Qiaolin Qin, Heng Li, Ettore Merlo, Maxime Lamothe:
Automated, Unsupervised, and Auto-Parameterized Inference of Data Patterns and Anomaly Detection. 2419-2431 - Shazibul Islam Shamim, Hanyang Hu, Akond Rahman:
On Prescription or Off Prescription? An Empirical Study of Community-Prescribed Security Configurations for Kubernetes. 2432-2444 - Zixuan Tan, Jiayuan Zhou, Xing Hu, Shengyi Pan, Kui Liu, Xin Xia:
Similar but Patched Code Considered Harmful: The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them. 2445-2457 - Youngjae Choi, Seunghoon Woo:
Tiver: Identifying Adaptive Versions of C/C++ Third-Party Open-Source Components Using a Code Clustering Technique. 2458-2469 - Kevin Hermann, Sven Peldszus, Jan-Philipp Steghöfer, Thorsten Berger:
An Exploratory Study on the Engineering of Security Features. 2470-2482 - Mingyue Yuan, Jieshan Chen, Zhenchang Xing, Aaron Quigley, Yuyu Luo, Tianqi Luo, Gelareh Mohammadi, Qinghua Lu, Liming Zhu:
DesignRepair: Dual-Stream Design Guideline-Aware Frontend Repair with Large Language Models. 2483-2494 - Anna Mazhar, Saad Sher Alam, William X. Zheng, Yinfang Chen, Suman Nath, Tianyin Xu:
Fidelity of Cloud Emulators: The Imitation Game of Testing Cloud-Based Software. 2495-2507 - Aleks Chakarov, Jaco Geldenhuys, Matthew Heck, Michael Hicks, Sam Huang, Georges-Axel Jaloyan, Anjali Joshi, K. Rustan M. Leino, Mikael Mayer, Sean McLaughlin, Akhilesh Mritunjai, Clément Pit-Claudel, Sorawee Porncharoenwase, Florian Rabe, Marianna Rapoport, Giles Reger, Cody Roux, Neha Rungta, Robin Salkeld, Matthias Schlaipfer, Daniel Schoepe, Johanna Schwartzentruber, Serdar Tasiran, Aaron Tomb, Emina Torlak, Jean-Baptiste Tristan, Lucas G. Wagner, Michael W. Whalen, Remy Willems, Tongtong Xiang, Tae Joon Byun, Joshua M. Cohen, Ruijie Fang, Junyoung Jang, Jakob Rath, Hira Taqdees Syeda, Dominik Wagner, Yongwei Yuan:
Formally Verified Cloud-Scale Authorization. 2508-2521 - Hongyuan Liang, Yue Huang, Tao Chen:
The Same Only Different: On Information Modality for Configuration Performance Analysis. 2522-2534 - Sarah Fakhoury, Markus Kuppe, Shuvendu K. Lahiri, Tahina Ramananandro, Nikhil Swamy:
3DGen: AI-Assisted Generation of Provably Correct Binary Format Parsers. 2535-2547 - Junjielong Xu, Ying Fu, Shin Hwei Tan, Pinjia He:
Aligning the Objective of LLM-Based Program Repair. 2548-2560 - Aidan Z. H. Yang, Sophia Kolak, Vincent J. Hellendoorn, Ruben Martins, Claire Le Goues:
Revisiting Unnaturalness for Automated Program Repair in the Era of Large Language Models. 2561-2573 - Nikhil Parasaram, Huijie Yan, Boyu Yang, Zineb Flahy, Abriele Qudsi, Damian Ziaber, Earl T. Barr, Sergey Mechtaev:
The Fact Selection Problem in LLM-Based Program Repair. 2574-2586 - Zhijie Wang, Zijie Zhou, Da Song, Yuheng Huang, Shengmai Chen, Lei Ma, Tianyi Zhang:
Towards Understanding the Characteristics of Code Generation Errors Made by Large Language Models. 2587-2599 - Chiming Duan
, Yong Yang, Tong Jia, Guiyang Liu, Jinbu Liu, Huxing Zhang, Qi Zhou, Ying Li, Gang Huang:
Famos: Fault Diagnosis for Microservice Systems Through Effective Multi-Modal Data Fusion. 2613-2624 - Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie A. Williams:
Leveraging Large Language Models to Detect NPM Malicious Packages. 2625-2637 - Yanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein:
MAGIKA: AI-Powered Content-Type Detection. 2638-2649 - Weisong Sun, Yuchen Chen, Mengzhe Yuan, Chunrong Fang, Zhenpeng Chen, Chong Wang, Yang Liu, Baowen Xu, Zhenyu Chen:
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness. 2663-2675 - Beatriz Souza, Michael Pradel:
Treefix: Enabling Execution with a Tree of Prefixes. 2676-2688 - Forough Mehralian, Ziyao He, Sam Malek:
Automated Accessibility Analysis of Dynamic Content Changes on Mobile Apps. 2689-2701 - Chijin Zhou, Quan Zhang, Bingzhou Qian, Yu Jiang:
Janus: Detecting Rendering Bugs in Web Browsers via Visual Delta Consistency. 2702-2713 - Chunhao Dong, Yanjie Jiang, Yuxia Zhang, Yang Zhang, Hui Liu:
Chatgpt-Based Test Generation for Refactoring Engines Enhanced by Feature Analysis on Examples. 2714-2725 - Hanmo You, Zan Wang, Bin Lin, Junjie Chen:
Navigating the Testing of Evolving Deep Learning Systems: An Exploratory Interview Study. 2726-2738 - Chenkai Guo, Qianlu Wang, Naipeng Dong, Lingling Fan, Tianhong Wang, Weijie Zhang, Enbao Chen, Zheli Liu, Lu Yu:
EP-Detector: Automatic Detection of Error-Prone Operation Anomalies in Android Applications. 2739-2750 - Faridah Akinotcho, Lili Wei, Julia Rubin:
Mobile Application Coverage: The 30% Curse and Ways Forward. 2751-2763 - Wuxia Jin, Jiaowei Shang, Jianguo Zheng, Mengjie Sun, Zhenyu Huang, Ming Fan, Ting Liu:
The Design Smells Breaking the Boundary between Android Variants and AOSP. 2764-2776 - Yuxin Zhang, Sen Chen, Xiaofei Xie, Zibo Liu, Lingling Fan:
Scenario-Driven and Context-Aware Automated Accessibility Testing for Android Apps. 2777-2789 - Yanchen Lu, Hongyu Lin, Zehua He, Haitao Xu, Zhao Li, Shuai Hao, Liu Wang, Haoyu Wang, Kui Ren:
TacDroid: Detection of Illicit Apps Through Hybrid Analysis of UI-Based Transition Graphs. 2790-2802 - Menglong Chen, Tian Tan, Minxue Pan, Yue Li:
PacDroid: A Pointer-Analysis-Centric Framework for Security Vulnerabilities in Android Apps. 2803-2815 - Dimitri Kokkonis
, Michaël Marcozzi, Emilien Decoux, Stefano Zacchiroli:
ROSA: Finding Backdoors with Fuzzing. 2816-2828 - Mengxia Ren, Anhao Xiang, Chuan Yue:
Analyzing the Feasibility of Adopting Google's Nonce-Based CSP Solutions on Websites. 2829-2840 - Lizhi Liao, Simon Eismann, Heng Li, Cor-Paul Bezemer, Diego Elias Costa, André van Hoorn, Weiyi Shang:
Early Detection of Performance Regressions by Bridging Local Performance Data and Architectural Models. 2841-2853 - Xiaolei Wang, Ruilin Li, Bin Zhang, Chao Feng, Chaojing Tang:
Practical Object-Level Sanitizer with Aggregated Memory Access and Custom Allocator. 2854-2866 - Heng Yong, Zhong Li, Minxue Pan, Tian Zhang, Jianhua Zhao, Xuandong Li:
GVI: Guided Vulnerability Imagination for Boosting Deep Vulnerability Detectors. 2867-2879 - Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang:
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. 2880-2892 - Satyaki Das, Syeda Tasnim Fabiha, Saad Shafiq, Nenad Medvidovic:
Are We Learning the Right Features? A Framework for Evaluating DL-Based Software Vulnerability Detection Solutions. 2893-2904 - Chong Wang, Jianan Liu, Xin Peng, Yang Liu, Yiling Lou:
Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention Inference. 2905-2917 - Minghua He
, Tong Jia, Chiming Duan
, Huaqian Cai, Ying Li, Gang Huang:
Weakly-Supervised Log-Based Anomaly Detection with Inexact Labels via Multi-Instance Learning. 2918-2930 - Jake Zappin, Trevor Stalnaker, Oscar Chaparro, Denys Poshyvanyk:
When Quantum Meets Classical: Characterizing Hybrid Quantum-Classical Issues Discussed in Developer Forums. 2931-2943 - Sigma Jahan, Mehil B. Shah, Parvez Mahbub, Mohammad Masudur Rahman:
Improved Detection and Diagnosis of Faults in Deep Neural Networks Using Hierarchical and Explainable Classification. 2944-2956 - Sehoon Kim, Yonghyeon Kim, Dahyeon Park, Yuseok Jeon, Jooyong Yi, Mijung Kim:
Lightweight Concolic Testing via Path-Condition Synthesis for Deep Learning Libraries. 2957-2969 - Ruchira Manke, Mohammad Wardat, Foutse Khomh, Hridesh Rajan:
Mock Deep Testing: Toward Separate Development of Data and Models for Deep Learning. 2970-2982 - Xiang Cheng, Fan Sang, Yizhuo Zhai, Xiaokuan Zhang, Taesoo Kim:
Rug: Turbo Llm for Rust Unit Test Generation. 2983-2995 - Mengya Zhang, Preksha Shukla, Wuqi Zhang, Zhuo Zhang, Pranav Agrawal, Zhiqiang Lin, Xiangyu Zhang, Xiaokuan Zhang:
An Empirical Study of Proxy Contracts at the Ethereum Ecosystem Scale. 2996-3008 - Jiashuo Zhang, Yiming Shen, Jiachi Chen, Jianzhong Su, Yanlin Wang, Ting Chen, Jianbo Gao, Zhong Chen:
Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts. 3009-3021 - Yuanhang Zhou, Zhen Yan, Yuanliang Chen, Fuchen Ma, Ting Chen, Yu Jiang:
Chord: Towards a Unified Detection of Blockchain Transaction Parallelism Bugs. 3022-3034 - Zewei Lin, Jiachi Chen, Jiajing Wu, Weizhe Zhang, Zibin Zheng:
Definition and Detection of Centralization Defects in Smart Contracts. 3035-3047 - Wonhoi Kim, Hocheol Nam, Muoi Tran, Amin Jalilov, Zhenkai Liang, Sang Kil Cha, Min Suk Kang:
Fork State-Aware Differential Fuzzing for Blockchain Consensus Implementations. 3048-3059 - Ran Mo, Haopeng Song, Wei Ding, Chaochao Wu:
Code Cloning in Solidity Smart Contracts: Prevalence, Evolution, and Impact on Development. 3060-3071 - Martin Beisel, Johanna Barzen, Frank Leymann, Lavinia Stiliadou, Daniel Vietz, Benjamin Weder:
Pattern-Based Generation and Adaptation of Quantum Workflows. 3072-3084 - Wen Zhang, Botang Xiao, Qingchen Kong, Le Guan, Wenwen Wang:
BSan: A Powerful Identifier-Based Hardware-Independent Memory Error Detector for COTS Binaries. 3085-3096 - Pantazis Deligiannis, Akash Lal, Nikita Mehrotra, Rishi Poddar, Aseem Rastogi:
RustAssistant: Using LLMs to Fix Compilation Errors in Rust Code. 3097-3109 - Kunpeng Zhang, Shuai Wang, Jitao Han, Xiaogang Zhu, Xian Li, Shaohua Wang, Sheng Wen:
Your Fix Is My Exploit: Enabling Comprehensive DL Library API Fuzzing with Large Language Models. 3110-3122 - Yisong Xiao, Aishan Liu, Xinwei Zhang, Tianyuan Zhang, Tianlin Li, Siyuan Liang, Xianglong Liu, Yang Liu, Dacheng Tao:
BDefects4NN: A Backdoor Defect Database for Controlled Localization Studies in Neural Networks. 3123-3135 - Hang Du, Vijay Krishna Palepu, James A. Jones:
Leveraging Propagated Infection to Crossfire Mutants. 3136-3148

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.