ISSTA 2022
Mon 18 - Fri 22 July 2022 Online

The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) is the leading research symposium on software testing and analysis, bringing together academics, industrial researchers, and practitioners to exchange new ideas, problems, and experience on how to analyze and test software systems.

Dates
You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 20 Jul

Displayed time zone: Seoul change

01:20 - 02:40
Session 1-1: Oracles, Models, and Measurement DTechnical Papers at ISSTA 1
01:20
20m
Talk
Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper
Technical Papers
Clay Stevens University of Nebraska-Lincoln, Hamid Bagheri University of Nebraska-Lincoln
DOI
01:40
20m
Talk
Evolution-Aware Detection of Order-Dependent Flaky Tests
Technical Papers
Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin
DOI
02:00
20m
Talk
jTrans: Jump-Aware Transformer for Binary Code Similarity Detection
Technical Papers
Hao Wang Tsinghua University, Wenjie Qu Huazhong University of Science and Technology, Gilad Katz Ben-Gurion University of the Negev, Wenyu Zhu Tsinghua University, Zeyu Gao University of Science and Technology of China, Han Qiu Tsinghua University, Jianwei Zhuge Tsinghua University, Chao Zhang Tsinghua University
DOI Pre-print
02:20
20m
Talk
On the Use of Evaluation Measures for Defect Prediction Studies
Technical Papers
Rebecca Moussa University College London, Federica Sarro University College London
DOI
01:20 - 02:20
Session 1-2: Test Generation and Mutation ATechnical Papers at ISSTA 2
Chair(s): Raghavan Komondoor IISc Bengaluru
01:20
20m
Talk
On the Use of Mutation Analysis For Evaluating Student Test Suite Quality
Technical Papers
James Perretta Northeastern University, Andrew DeOrio University of Michigan, Arjun Guha Northeastern University, Jonathan Bell Northeastern University
DOI
01:40
20m
Talk
Automated Test Generation for REST APIs: No Time to Rest Yet
Technical Papers
Myeongsoo Kim , Qi Xin Wuhan University, Saurabh Sinha IBM Research, Alessandro Orso Georgia Tech
DOI
02:00
20m
Talk
One Step Further: Evaluating Interpreters Using Metamorphic Testing
Technical Papers
Ming Fan Xi'an Jiaotong University, Jiali Wei Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhou Xu Wuhan University, Wenying Wei Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
DOI
03:00 - 04:00
Session 1-3: Oracles, Models, and Measurement ATechnical Papers at ISSTA 1
03:00
20m
Talk
Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper)
Technical Papers
Jialu Zhang Yale University, Todd Mytkowicz Microsoft Research, Mike Kaufman Microsoft Corporation, Ruzica Piskac Yale University, Shuvendu Lahiri Microsoft Research
DOI
03:20
20m
Talk
Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing
Technical Papers
Hasan Ferit Eniser MPI-SWS, Timo P. Gros Saarland University, Germany, Valentin Wüstholz ConsenSys, Jörg Hoffmann Saarland University and DFKI, Germany, Maria Christakis MPI-SWS
DOI Pre-print
03:40
20m
Talk
An Extensive Study on Pre-trained Models for Program Understanding and Generation
Technical Papers
Zhengran Zeng Southern University of Science and Technology, Hanzhuo Tan Southern University of Science and Technology, The Hong Kong Polytechnic University, Haotian Zhang , Jing Li The Hong Kong Polytech University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
03:00 - 04:00
Session 1-4: Smart Contracts ATechnical Papers at ISSTA 2
03:00
20m
Talk
eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts
Technical Papers
Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Karthik Pattabiraman University of British Columbia
DOI
03:20
20m
Talk
Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution
Technical Papers
Peilin Zheng Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University
DOI
03:40
20m
Talk
WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts
Technical Papers
Weimin Chen The Hong Kong Polytechnic University, Zihan Sun Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Haipeng Cai Washington State University, USA, Lei Wu Zhejiang University
DOI
07:00 - 08:20
Session 2-1: Oracles, Models, and Measurement ETechnical Papers at ISSTA 1
Chair(s): Christoph Csallner University of Texas at Arlington
07:00
20m
Talk
On the Use of Evaluation Measures for Defect Prediction Studies
Technical Papers
Rebecca Moussa University College London, Federica Sarro University College London
DOI
07:20
20m
Talk
Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper
Technical Papers
Clay Stevens University of Nebraska-Lincoln, Hamid Bagheri University of Nebraska-Lincoln
DOI
07:40
20m
Talk
Evolution-Aware Detection of Order-Dependent Flaky Tests
Technical Papers
Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin
DOI
08:00
20m
Talk
FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases
Technical Papers
Gabin An KAIST, Shin Yoo KAIST
DOI Pre-print
07:00 - 08:20
Session 2-2: Neural Networks, Learning, NLP ETechnical Papers at ISSTA 2
07:00
20m
Talk
Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper
Technical Papers
Zhiming Li Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Singapore, Haoliang Li City University of Hong Kong, Zhengzi Xu Nanyang Technological University, Yi Li Nanyang Technological University, Singapore, Yang Liu Nanyang Technological University
DOI
07:20
20m
Talk
DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions
Technical Papers
Danning Xie Purdue University, Yitong Li University of Waterloo, Mijung Kim UNIST, Hung Viet Pham University of Waterloo, Lin Tan Purdue University, Xiangyu Zhang Purdue University, Michael W. Godfrey University of Waterloo, Canada
DOI
07:40
20m
Talk
HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models
Technical Papers
Yu Li The Chinese University of Hong Kong, Muxi Chen The Chinese University of Hong Kong, Xu, Qiang
DOI
08:00
20m
Talk
Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs
Technical Papers
Charaka Geethal Monash University, Thuan Pham The University of Melbourne, Aldeida Aleti Monash University, Marcel Böhme MPI-SP, Germany and Monash University, Australia
DOI Pre-print
08:40 - 09:40
Session 2-3: Oracles, Models, and Measurement BTechnical Papers at ISSTA 1
08:40
20m
Talk
TELL: Log Level Suggestions via Modeling Multi-level Code Block Information
Technical Papers
Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore
DOI
09:00
20m
Talk
Hunting Bugs with Accelerated Optimal Graph Vertex Matching
Technical Papers
Xiaohui Zhang Renmin University of China, Yuanjun Gong Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wei You Renmin University of China, Wenchang Shi Renmin University of China, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI
09:20
20m
Talk
Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper)
Technical Papers
Jialu Zhang Yale University, Todd Mytkowicz Microsoft Research, Mike Kaufman Microsoft Corporation, Ruzica Piskac Yale University, Shuvendu Lahiri Microsoft Research
DOI
08:40 - 09:40
Session 2-4: Neural Networks, Learning, NLP BTechnical Papers at ISSTA 2
08:40
20m
Talk
ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems
Technical Papers
Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Zhenyu Chen Nanjing University
DOI
09:00
20m
Talk
BET: Black-box Efficient Testing for Convolutional Neural Networks
Technical Papers
Wang Jialai Tsinghua University, Han Qiu Tsinghua University, Yi Rong Tsinghua University, Hengkai Ye Purdue University, Qi Li Tsinghua University, Zongpeng Li Tsinghua University, Chao Zhang Tsinghua University
DOI
09:20
20m
Talk
Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment
Technical Papers
Geunwoo Kim University of California, Irvine, USA, Sanghyun Hong Oregon State University, Michael Franz University of California, Irvine, Dokyung Song Yonsei University, South Korea
DOI
10:00 - 11:00
Session 2-5: Android BTechnical Papers at ISSTA 1
Chair(s): Christoph Csallner University of Texas at Arlington
10:00
20m
Talk
Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study)
Technical Papers
Pei Liu Monash University, Yanjie Zhao Monash University, Haipeng Cai Washington State University, USA, Mattia Fazzini University of Minnesota, John Grundy Monash University, Li Li Monash University
DOI
10:20
20m
Talk
PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications
Technical Papers
Shuaihao Yang Nanjing University of Science and Technology, Zigang Zeng Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology
DOI
10:40
20m
Talk
Detecting and Fixing Data Loss Issues in Android Apps
Technical Papers
Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University
DOI
10:00 - 10:40
Session 2-6: Concurrency, IoT, Embedded ETechnical Papers at ISSTA 2
10:00
20m
Talk
Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems
Technical Papers
Ziyuan Zhong Columbia University, Zhisheng Hu Baidu Security, Shengjian Guo Baidu Security, Xinyang Zhang Baidu Security, Zhenyu Zhong Baidu USA, Baishakhi Ray Columbia University
DOI
10:20
20m
Talk
Deadlock Prediction via Generalized Dependency
Technical Papers
Jinpeng Zhou University of Pittsburgh, Hanmei Yang University of Massachusetts Amherst, John Lange Oak Ridge National Lab/University of Pittsburgh, Tongping Liu University of Massachusetts at Amherst
DOI
16:20 - 17:40
Session 3-1: Static Analysis and Specifications Testing CTechnical Papers at ISSTA 1
Chair(s): Ding Li Peking University
16:20
20m
Talk
A Large-scale Study of Usability Criteria addressed by Static Analysis Tools
Technical Papers
Marcus Nachtigall Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institute, Paderborn University, Eric Bodden University of Paderborn; Fraunhofer IEM
DOI
16:40
20m
Talk
An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection
Technical Papers
Stephan Lipp Technical University of Munich, Sebastian Banescu Technical University of Munich, Alexander Pretschner TU Munich
DOI Pre-print
17:00
20m
Talk
Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper)
Technical Papers
Frank Busse Imperial College London, Pritam Gharat Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London
DOI Pre-print
17:20
20m
Talk
Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
Technical Papers
Xiao Cheng University of Technology Sydney, Guanqin Zhang University of Technology Sydney, Haoyu Wang Huazhong University of Science and Technology, China, Yulei Sui University of New South Wales
DOI
16:20 - 17:20
Session 3-2: Fuzzing and Friends CTechnical Papers at ISSTA 2
Chair(s): Behnaz Hassanshahi Oracle Labs, Australia
16:20
20m
Talk
SnapFuzz: High-Throughput Fuzzing of Network Applications
Technical Papers
Anastasios Andronidis Imperial College London, UK, Cristian Cadar Imperial College London, UK
DOI
16:40
20m
Talk
SLIME: Program-sensitive Energy Allocation for Fuzzing
Technical Papers
Chenyang Lyu Zhejiang University, Hong Liang Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Binbin Zhao Georgia Institute of Technology, Meng Han Binjiang Institute of Zhejiang University & Zhejiang University, Yun Li Huawei Technologies Co., Ltd., Zhe Wang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology
DOI
17:00
20m
Talk
Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs
Technical Papers
Sumit Lahiri Indian Institute Of Technology Kanpur, Subhajit Roy IIT Kanpur, India
DOI
18:00 - 19:00
Session 3-3: Test Generation and Mutation CTechnical Papers at ISSTA 1
Chair(s): Stefan Winter LMU Munich
18:00
20m
Talk
One Step Further: Evaluating Interpreters Using Metamorphic Testing
Technical Papers
Ming Fan Xi'an Jiaotong University, Jiali Wei Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhou Xu Wuhan University, Wenying Wei Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
DOI
18:20
20m
Talk
Test Mimicry to Assess the Exploitability of Library Vulnerabilities
Technical Papers
Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Xuan Bach D. Le The University of Melbourne, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, David Lo Singapore Management University
DOI
18:40
20m
Talk
RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History
Technical Papers
Xuezhi Song Fudan University, Yun Lin National University of Singapore, Siang Hwee Ng National University of Singapore, Yijian Wu Fudan University, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University
DOI Pre-print
18:00 - 19:00
Session 3-4: Fuzzing and Friends ETechnical Papers at ISSTA 2
Chair(s): Ding Li Peking University
18:00
20m
Talk
Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation
Technical Papers
Yaowen Zheng Nanyang Technological University; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China;, Yuekang Li Nanyang Technological University, Cen Zhang Nanyang Technological University, Hongsong Zhu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University, Limin Sun Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China
DOI
18:20
20m
Talk
MDPFuzz: Testing Models Solving Markov Decision Processes
Technical Papers
Qi Pang HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
DOI
18:40
20m
Talk
PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation
Technical Papers
Zheyu Ma , Bodong Zhao Tsinghua University, Letu Ren Department of Computer Science and Technology, Tsinghua University, Zheming Li Tsinghua University, Siqi Ma the University of Queensland, Xiapu Luo Hong Kong Polytechnic University, Chao Zhang Tsinghua University
DOI

Thu 21 Jul

Displayed time zone: Seoul change

01:20 - 02:00
Session 1-5: Static Analysis and Specifications Testing DTechnical Papers at ISSTA 1
01:20
20m
Talk
Testing Dafny (Experience Paper)
Technical Papers
Ahmed Irfan Amazon Web Services, Sorawee Porncharoenwase University of Washington, Zvonimir Rakamaric Amazon Web Services, Neha Rungta Amazon Web Services, Emina Torlak Amazon Web Services
DOI
01:40
20m
Talk
The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper
Technical Papers
Ingkarat Rak-amnouykit Rensselaer Polytechnic Institute, Ana Milanova Rensselaer Polytechnic Institute, Guillaume Baudart Inria; ENS; PSL University, Martin Hirzel IBM Research, Julian Dolby IBM Research, USA
DOI
01:20 - 02:20
Session 1-6: Concurrency, IoT, Embedded ATechnical Papers at ISSTA 2
01:20
20m
Talk
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware
Technical Papers
Binbin Zhao Georgia Institute of Technology, Shouling Ji Zhejiang University, Jiacheng Xu Zhejiang University, Yuan Tian University of Virginia, Qiuyang Wei Zhejiang University, Qinying Wang Zhejiang University, Chenyang Lyu Zhejiang University, Xuhong Zhang Zhejiang University, Changting Lin Binjiang Institute of Zhejiang University, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Raheem Beyah Georgia Institute of Technology
DOI
01:40
20m
Talk
Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems
Technical Papers
Ziyuan Zhong Columbia University, Zhisheng Hu Baidu Security, Shengjian Guo Baidu Security, Xinyang Zhang Baidu Security, Zhenyu Zhong Baidu USA, Baishakhi Ray Columbia University
DOI
02:00
20m
Talk
Understanding Device Integration Bugs in Smart Home System
Technical Papers
Tao Wang , Kangkang Zhang Institute of Software Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
DOI
03:00 - 04:00
Session 1-7: Static Analysis and Specifications Testing ATechnical Papers at ISSTA 1
Chair(s): Raghavan Komondoor IISc Bengaluru
03:00
20m
Talk
A Large-scale Study of Usability Criteria addressed by Static Analysis Tools
Technical Papers
Marcus Nachtigall Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institute, Paderborn University, Eric Bodden University of Paderborn; Fraunhofer IEM
DOI
03:20
20m
Talk
An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection
Technical Papers
Stephan Lipp Technical University of Munich, Sebastian Banescu Technical University of Munich, Alexander Pretschner TU Munich
DOI Pre-print
03:40
20m
Talk
Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper)
Technical Papers
Frank Busse Imperial College London, Pritam Gharat Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London
DOI Pre-print
03:00 - 03:40
Session 1-8: Concurrency, IoT, Embedded DTechnical Papers at ISSTA 2
03:00
20m
Talk
Deadlock Prediction via Generalized Dependency
Technical Papers
Jinpeng Zhou University of Pittsburgh, Hanmei Yang University of Massachusetts Amherst, John Lange Oak Ridge National Lab/University of Pittsburgh, Tongping Liu University of Massachusetts at Amherst
DOI
03:20
20m
Talk
Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning
Technical Papers
Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China
DOI
07:00 - 08:00
Session 2-7: Test Generation and Mutation BTechnical Papers at ISSTA 1
Chair(s): Christoph Csallner University of Texas at Arlington
07:00
20m
Talk
Automated Test Generation for REST APIs: No Time to Rest Yet
Technical Papers
Myeongsoo Kim , Qi Xin Wuhan University, Saurabh Sinha IBM Research, Alessandro Orso Georgia Tech
DOI
07:20
20m
Talk
On the Use of Mutation Analysis For Evaluating Student Test Suite Quality
Technical Papers
James Perretta Northeastern University, Andrew DeOrio University of Michigan, Arjun Guha Northeastern University, Jonathan Bell Northeastern University
DOI
07:40
20m
Talk
Test Mimicry to Assess the Exploitability of Library Vulnerabilities
Technical Papers
Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Xuan Bach D. Le The University of Melbourne, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, David Lo Singapore Management University
DOI
07:00 - 08:00
Session 2-8: Concurrency, IoT, Embedded BTechnical Papers at ISSTA 2
07:00
20m
Talk
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware
Technical Papers
Binbin Zhao Georgia Institute of Technology, Shouling Ji Zhejiang University, Jiacheng Xu Zhejiang University, Yuan Tian University of Virginia, Qiuyang Wei Zhejiang University, Qinying Wang Zhejiang University, Chenyang Lyu Zhejiang University, Xuhong Zhang Zhejiang University, Changting Lin Binjiang Institute of Zhejiang University, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Raheem Beyah Georgia Institute of Technology
DOI
07:20
20m
Talk
Automated Testing of Image Captioning Systems
Technical Papers
BoXi Yu The Chinese University of Hong Kong, Shenzhen, Zhiqing Zhong South China University of Technology, Xinran Qin South China University of Technology, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuancheng Wang The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen
DOI
07:40
20m
Talk
LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems
Technical Papers
Guo An Nanjing University, Yang Feng Nanjing University, Zhenyu Chen Nanjing University
DOI
08:40 - 09:40
Session 2-9: Test Generation and Mutation DTechnical Papers at ISSTA 1
08:40
20m
Talk
Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing
Technical Papers
Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yicheng Wang Institute of Software Chinese Academy of Sciences, Zheng Qin Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
09:00
20m
Talk
RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History
Technical Papers
Xuezhi Song Fudan University, Yun Lin National University of Singapore, Siang Hwee Ng National University of Singapore, Yijian Wu Fudan University, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University
DOI Pre-print
09:20
20m
Talk
Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis
Technical Papers
Zhiyong Wu Tsinghua University, China, Jie Liang School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University
DOI
08:40 - 09:40
Session 2-10: Static Analysis and Specifications Testing BTechnical Papers at ISSTA 2
Chair(s): Behnaz Hassanshahi Oracle Labs, Australia
08:40
20m
Talk
Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
Technical Papers
Xiao Cheng University of Technology Sydney, Guanqin Zhang University of Technology Sydney, Haoyu Wang Huazhong University of Science and Technology, China, Yulei Sui University of New South Wales
DOI
09:00
20m
Talk
Testing Dafny (Experience Paper)
Technical Papers
Ahmed Irfan Amazon Web Services, Sorawee Porncharoenwase University of Washington, Zvonimir Rakamaric Amazon Web Services, Neha Rungta Amazon Web Services, Emina Torlak Amazon Web Services
DOI
09:20
20m
Talk
The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper
Technical Papers
Ingkarat Rak-amnouykit Rensselaer Polytechnic Institute, Ana Milanova Rensselaer Polytechnic Institute, Guillaume Baudart Inria; ENS; PSL University, Martin Hirzel IBM Research, Julian Dolby IBM Research, USA
DOI
16:20 - 17:40
Session 3-5: Concurrency, IoT, Embedded CTechnical Papers at ISSTA 1
Chair(s): Stefan Winter LMU Munich
16:20
20m
Talk
Understanding Device Integration Bugs in Smart Home System
Technical Papers
Tao Wang , Kangkang Zhang Institute of Software Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
DOI
16:40
20m
Talk
Automated Testing of Image Captioning Systems
Technical Papers
BoXi Yu The Chinese University of Hong Kong, Shenzhen, Zhiqing Zhong South China University of Technology, Xinran Qin South China University of Technology, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuancheng Wang The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen
DOI
17:00
20m
Talk
LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems
Technical Papers
Guo An Nanjing University, Yang Feng Nanjing University, Zhenyu Chen Nanjing University
DOI
17:20
20m
Talk
Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning
Technical Papers
Chao Li Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Rui Chen Beijing Institute of Control Engineering, Boxiang Wang Xidian University and Beijing Sunwise Information Technology Ltd, Tingting Yu Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Dongdong Gao Beijing Institute of Control Engineering and Beijing Sunwise Information Technology Ltd, Mengfei Yang China Academy of Space Technology, China
DOI
16:20 - 17:40
Session 3-6: Neural Networks, Learning, NLP FTechnical Papers at ISSTA 2
16:20
20m
Talk
AEON: A Method for Automatic Evaluation of NLP Test Cases
Technical Papers
Jen-tse Huang The Chinese University of Hong Kong, Jianping Zhang The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong
DOI
16:40
20m
Talk
HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models
Technical Papers
Yu Li The Chinese University of Hong Kong, Muxi Chen The Chinese University of Hong Kong, Xu, Qiang
DOI
17:00
20m
Talk
Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment
Technical Papers
Geunwoo Kim University of California, Irvine, USA, Sanghyun Hong Oregon State University, Michael Franz University of California, Irvine, Dokyung Song Yonsei University, South Korea
DOI
17:20
20m
Talk
Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs
Technical Papers
Charaka Geethal Monash University, Thuan Pham The University of Melbourne, Aldeida Aleti Monash University, Marcel Böhme MPI-SP, Germany and Monash University, Australia
DOI Pre-print
18:00 - 18:40
Session 3-7: Test Generation and Mutation ETechnical Papers at ISSTA 1
18:00
20m
Talk
Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing
Technical Papers
Yingying Zheng Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yicheng Wang Institute of Software Chinese Academy of Sciences, Zheng Qin Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
18:20
20m
Talk
Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis
Technical Papers
Zhiyong Wu Tsinghua University, China, Jie Liang School of Software, Tsinghua University, Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University
DOI
18:00 - 18:40
Session 3-8: Program Repair CTechnical Papers at ISSTA 2
18:00
20m
Talk
CIRCLE: Continual Repair across Programming Languages
Technical Papers
Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland
DOI
18:20
20m
Talk
Program Vulnerability Repair via Inductive Inference
Technical Papers
Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore
DOI

Fri 22 Jul

Displayed time zone: Seoul change

00:00 - 01:00
Session 1-9: Fuzzing and Friends ATechnical Papers at ISSTA 1
00:00
20m
Talk
Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs
Technical Papers
Sumit Lahiri Indian Institute Of Technology Kanpur, Subhajit Roy IIT Kanpur, India
DOI
00:20
20m
Talk
MDPFuzz: Testing Models Solving Markov Decision Processes
Technical Papers
Qi Pang HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
DOI
00:40
20m
Talk
SnapFuzz: High-Throughput Fuzzing of Network Applications
Technical Papers
Anastasios Andronidis Imperial College London, UK, Cristian Cadar Imperial College London, UK
DOI
00:00 - 01:00
Session 1-10: Neural Networks, Learning, NLP ATechnical Papers at ISSTA 2
00:00
20m
Talk
AEON: A Method for Automatic Evaluation of NLP Test Cases
Technical Papers
Jen-tse Huang The Chinese University of Hong Kong, Jianping Zhang The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong
DOI
00:20
20m
Talk
Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study)
Technical Papers
Michael Weiss Università della Svizzera italiana (USI), Paolo Tonella USI Lugano
DOI Pre-print
00:40
20m
Talk
ε-weakened Robustness of Deep Neural Networks
Technical Papers
Pei Huang State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Yuting Yang Institute of Computing Technology,Chinese Academy of Sciences; University of Chinese Academy of Sciences, Minghao Liu Institute of Software, Chinese Academy of Sciences, Fuqi Jia State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI
01:40 - 02:20
Session 1-11: Fuzzing and Friends DTechnical Papers at ISSTA 1
01:40
20m
Talk
Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation
Technical Papers
Yaowen Zheng Nanyang Technological University; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China;, Yuekang Li Nanyang Technological University, Cen Zhang Nanyang Technological University, Hongsong Zhu Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University, Limin Sun Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China
DOI
02:00
20m
Talk
TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving
Technical Papers
Xuwei Liu Purdue University, USA, Wei You Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University
DOI
01:40 - 02:20
Session 1-12: Neural Networks, Learning, NLP DTechnical Papers at ISSTA 2
01:40
20m
Talk
Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper
Technical Papers
Zhiming Li Nanyang Technological University, Singapore, Xiaofei Xie Singapore Management University, Singapore, Haoliang Li City University of Hong Kong, Zhengzi Xu Nanyang Technological University, Yi Li Nanyang Technological University, Singapore, Yang Liu Nanyang Technological University
DOI
02:00
20m
Talk
DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions
Technical Papers
Danning Xie Purdue University, Yitong Li University of Waterloo, Mijung Kim UNIST, Hung Viet Pham University of Waterloo, Lin Tan Purdue University, Xiangyu Zhang Purdue University, Michael W. Godfrey University of Waterloo, Canada
DOI
03:00 - 03:40
Session 1-13: Program Repair ATechnical Papers at ISSTA 1
03:00
20m
Talk
ATR: Template-based Repair for Alloy Specifications
Technical Papers
Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln
DOI
03:20
20m
Talk
Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code
Technical Papers
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
DOI Pre-print
03:00 - 03:40
Session 1-14: Android ATechnical Papers at ISSTA 2
Chair(s): Christoph Csallner University of Texas at Arlington
03:00
20m
Talk
Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android
Technical Papers
Yifei Lu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Xuandong Li Nanjing University
DOI
03:20
20m
Talk
NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper
Technical Papers
Hao Zhou The Hong Kong Polytechnic University, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Ting Wang Pennsylvania State University, Yajin Zhou Zhejiang University, Chao Zhang Tsinghua University, Haipeng Cai Washington State University, USA
DOI
07:00 - 08:00
Session 2-13: Fuzzing and Friends BTechnical Papers at ISSTA 1
07:00
20m
Talk
PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation
Technical Papers
Zheyu Ma , Bodong Zhao Tsinghua University, Letu Ren Department of Computer Science and Technology, Tsinghua University, Zheming Li Tsinghua University, Siqi Ma the University of Queensland, Xiapu Luo Hong Kong Polytechnic University, Chao Zhang Tsinghua University
DOI
07:20
20m
Talk
SLIME: Program-sensitive Energy Allocation for Fuzzing
Technical Papers
Chenyang Lyu Zhejiang University, Hong Liang Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Binbin Zhao Georgia Institute of Technology, Meng Han Binjiang Institute of Zhejiang University & Zhejiang University, Yun Li Huawei Technologies Co., Ltd., Zhe Wang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology
DOI
07:40
20m
Talk
TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving
Technical Papers
Xuwei Liu Purdue University, USA, Wei You Renmin University of China, Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University
DOI
07:00 - 08:20
Session 2-14: Program Repair BTechnical Papers at ISSTA 2
Chair(s): Christoph Csallner University of Texas at Arlington
07:00
20m
Talk
ATR: Template-based Repair for Alloy Specifications
Technical Papers
Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln
DOI
07:20
20m
Talk
CIRCLE: Continual Repair across Programming Languages
Technical Papers
Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland
DOI
07:40
20m
Talk
Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code
Technical Papers
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
DOI Pre-print
08:00
20m
Talk
Program Vulnerability Repair via Inductive Inference
Technical Papers
Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore
DOI
08:40 - 09:40
Session 2-15: Smart Contracts BTechnical Papers at ISSTA 1
08:40
20m
Talk
eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts
Technical Papers
Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Karthik Pattabiraman University of British Columbia
DOI
09:00
20m
Talk
Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper
Technical Papers
Ye Liu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Singapore, Shang-Wei Lin Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden
DOI Pre-print
09:20
20m
Talk
SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability
Technical Papers
Zeqin Liao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiao Chen Sun Yat-sen University, Yuhong Nan Sun Yat-sen University
DOI
15:00 - 16:20
Session 3-9: Smart Contracts CTechnical Papers at ISSTA 1
15:00
20m
Talk
Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper
Technical Papers
Ye Liu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Singapore, Shang-Wei Lin Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden
DOI Pre-print
15:20
20m
Talk
Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution
Technical Papers
Peilin Zheng Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University
DOI
15:40
20m
Talk
SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability
Technical Papers
Zeqin Liao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiao Chen Sun Yat-sen University, Yuhong Nan Sun Yat-sen University
DOI
16:00
20m
Talk
WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts
Technical Papers
Weimin Chen The Hong Kong Polytechnic University, Zihan Sun Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Haipeng Cai Washington State University, USA, Lei Wu Zhejiang University
DOI
15:00 - 16:20
Session 3-10: Neural Networks, Learning, NLP CTechnical Papers at ISSTA 2
15:00
20m
Talk
ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems
Technical Papers
Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Zhenyu Chen Nanjing University
DOI
15:20
20m
Talk
BET: Black-box Efficient Testing for Convolutional Neural Networks
Technical Papers
Wang Jialai Tsinghua University, Han Qiu Tsinghua University, Yi Rong Tsinghua University, Hengkai Ye Purdue University, Qi Li Tsinghua University, Zongpeng Li Tsinghua University, Chao Zhang Tsinghua University
DOI
15:40
20m
Talk
Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study)
Technical Papers
Michael Weiss Università della Svizzera italiana (USI), Paolo Tonella USI Lugano
DOI Pre-print
16:00
20m
Talk
ε-weakened Robustness of Deep Neural Networks
Technical Papers
Pei Huang State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Yuting Yang Institute of Computing Technology,Chinese Academy of Sciences; University of Chinese Academy of Sciences, Minghao Liu Institute of Software, Chinese Academy of Sciences, Fuqi Jia State Key Laboratory of Computer Science, Institution of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI
16:40 - 17:40
Session 3-11: Oracles, Models, and Measurement CTechnical Papers at ISSTA 1
16:40
20m
Talk
An Extensive Study on Pre-trained Models for Program Understanding and Generation
Technical Papers
Zhengran Zeng Southern University of Science and Technology, Hanzhuo Tan Southern University of Science and Technology, The Hong Kong Polytechnic University, Haotian Zhang , Jing Li The Hong Kong Polytech University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
17:00
20m
Talk
Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing
Technical Papers
Hasan Ferit Eniser MPI-SWS, Timo P. Gros Saarland University, Germany, Valentin Wüstholz ConsenSys, Jörg Hoffmann Saarland University and DFKI, Germany, Maria Christakis MPI-SWS
DOI Pre-print
17:20
20m
Talk
TELL: Log Level Suggestions via Modeling Multi-level Code Block Information
Technical Papers
Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore
DOI
16:40 - 17:40
Session 3-12: Android CTechnical Papers at ISSTA 2
16:40
20m
Talk
Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study)
Technical Papers
Pei Liu Monash University, Yanjie Zhao Monash University, Haipeng Cai Washington State University, USA, Mattia Fazzini University of Minnesota, John Grundy Monash University, Li Li Monash University
DOI
17:00
20m
Talk
Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android
Technical Papers
Yifei Lu Nanjing University, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Xuandong Li Nanjing University
DOI
17:20
20m
Talk
NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper
Technical Papers
Hao Zhou The Hong Kong Polytechnic University, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Ting Wang Pennsylvania State University, Yajin Zhou Zhejiang University, Chao Zhang Tsinghua University, Haipeng Cai Washington State University, USA
DOI
18:00 - 19:00
Session 3-13: Oracles, Models, and Measurement FTechnical Papers at ISSTA 1
Chair(s): Stefan Winter LMU Munich
18:00
20m
Talk
jTrans: Jump-Aware Transformer for Binary Code Similarity Detection
Technical Papers
Hao Wang Tsinghua University, Wenjie Qu Huazhong University of Science and Technology, Gilad Katz Ben-Gurion University of the Negev, Wenyu Zhu Tsinghua University, Zeyu Gao University of Science and Technology of China, Han Qiu Tsinghua University, Jianwei Zhuge Tsinghua University, Chao Zhang Tsinghua University
DOI Pre-print
18:20
20m
Talk
FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases
Technical Papers
Gabin An KAIST, Shin Yoo KAIST
DOI Pre-print
18:40
20m
Talk
Hunting Bugs with Accelerated Optimal Graph Vertex Matching
Technical Papers
Xiaohui Zhang Renmin University of China, Yuanjun Gong Renmin University of China, Bin Liang Renmin University of China, China, Jianjun Huang Renmin University of China, China, Wei You Renmin University of China, Wenchang Shi Renmin University of China, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI
18:00 - 18:40
Session 3-14: Android DTechnical Papers at ISSTA 2
18:00
20m
Talk
Detecting and Fixing Data Loss Issues in Android Apps
Technical Papers
Wunan Guo Fudan University, Zhen Dong Fudan University, China, Liwei Shen Fudan University, Wei Tian Fudan University, Ting Su East China Normal University, Xin Peng Fudan University
DOI
18:20
20m
Talk
PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications
Technical Papers
Shuaihao Yang Nanjing University of Science and Technology, Zigang Zeng Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology
DOI

Accepted Papers

Title
AEON: A Method for Automatic Evaluation of NLP Test Cases
Technical Papers
DOI
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware
Technical Papers
DOI
A Large-scale Study of Usability Criteria addressed by Static Analysis Tools
Technical Papers
DOI
Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs
Technical Papers
DOI
An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection
Technical Papers
DOI Pre-print
An Extensive Study on Pre-trained Models for Program Understanding and Generation
Technical Papers
DOI
ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems
Technical Papers
DOI
ATR: Template-based Repair for Alloy Specifications
Technical Papers
DOI
Automated Test Generation for REST APIs: No Time to Rest Yet
Technical Papers
DOI
Automated Testing of Image Captioning Systems
Technical Papers
DOI
Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study)
Technical Papers
DOI
BET: Black-box Efficient Testing for Convolutional Neural Networks
Technical Papers
DOI
CIRCLE: Continual Repair across Programming Languages
Technical Papers
DOI
Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving SystemsACM SIGSOFT Distinguished Paper
Technical Papers
DOI
Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper)
Technical Papers
DOI Pre-print
Cross-Lingual Transfer Learning for Statistical Type InferenceACM SIGSOFT Distinguished Paper
Technical Papers
DOI
Deadlock Prediction via Generalized Dependency
Technical Papers
DOI
Detecting and Fixing Data Loss Issues in Android Apps
Technical Papers
DOI
Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems
Technical Papers
DOI
Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android
Technical Papers
DOI
DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions
Technical Papers
DOI
Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation
Technical Papers
DOI
eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts
Technical Papers
DOI
Evolution-Aware Detection of Order-Dependent Flaky Tests
Technical Papers
DOI
FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases
Technical Papers
DOI Pre-print
Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing
Technical Papers
DOI
Finding Permission Bugs in Smart Contracts with Role MiningACM SIGSOFT Distinguished Paper
Technical Papers
DOI Pre-print
Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs
Technical Papers
DOI Pre-print
Hunting Bugs with Accelerated Optimal Graph Vertex Matching
Technical Papers
DOI
HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models
Technical Papers
DOI
Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment
Technical Papers
DOI
jTrans: Jump-Aware Transformer for Binary Code Similarity Detection
Technical Papers
DOI Pre-print
LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems
Technical Papers
DOI
MDPFuzz: Testing Models Solving Markov Decision Processes
Technical Papers
DOI
Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing
Technical Papers
DOI Pre-print
NCScope: Hardware-Assisted Analyzer for Native Code in Android AppsACM SIGSOFT Distinguished Paper
Technical Papers
DOI
One Step Further: Evaluating Interpreters Using Metamorphic Testing
Technical Papers
DOI
On the Use of Evaluation Measures for Defect Prediction Studies
Technical Papers
DOI
On the Use of Mutation Analysis For Evaluating Student Test Suite Quality
Technical Papers
DOI
Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution
Technical Papers
DOI
Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code
Technical Papers
DOI Pre-print
Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
Technical Papers
DOI
PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications
Technical Papers
DOI
Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning
Technical Papers
DOI
PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation
Technical Papers
DOI
Program Vulnerability Repair via Inductive Inference
Technical Papers
DOI
RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History
Technical Papers
DOI Pre-print
Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study)
Technical Papers
DOI Pre-print
SLIME: Program-sensitive Energy Allocation for Fuzzing
Technical Papers
DOI
SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability
Technical Papers
DOI
SnapFuzz: High-Throughput Fuzzing of Network Applications
Technical Papers
DOI
TELL: Log Level Suggestions via Modeling Multi-level Code Block Information
Technical Papers
DOI
TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving
Technical Papers
DOI
Testing Dafny (Experience Paper)
Technical Papers
DOI
Test Mimicry to Assess the Exploitability of Library Vulnerabilities
Technical Papers
DOI
The Raise of Machine Learning Hyperparameter Constraints in Python CodeACM SIGSOFT Distinguished Paper
Technical Papers
DOI
Understanding Device Integration Bugs in Smart Home System
Technical Papers
DOI
Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis
Technical Papers
DOI
Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper)
Technical Papers
DOI
WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts
Technical Papers
DOI
ε-weakened Robustness of Deep Neural Networks
Technical Papers
DOI

Call for Papers

[Updated Jan. 2022]

ISSTA invites three kinds of submissions. The clear majority of submissions is expected to be “Research Papers”, but submissions that best fit the description of “Experience Papers” or “Replicability Studies” should be submitted as such.

Research Papers

Authors are invited to submit research papers describing original contributions in testing or analysis of computer software. Papers describing original theoretical or empirical research, new techniques, methods for emerging systems, in-depth case studies, infrastructures of testing and analysis, or tools are welcome.

Experience Papers

Authors are invited to submit experience papers describing a significant experience in applying software testing and analysis methods or tools and should carefully identify and discuss important lessons learned so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of software testing and analysis methods or tools.

Replicability Studies

ISSTA would like to encourage researchers to replicate results from previous papers. A replicability study must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. It should at the very least apply the approach to new, significantly broadened inputs. Particularly, replicability studies are encouraged to target techniques that previously were evaluated only on proprietary subject programs or inputs. A replicability study should clearly report on results that the authors were able to replicate as well as on aspects of the work that were not replicable. In the latter case, authors are encouraged to make an effort to communicate or collaborate with the original paper’s authors to determine the cause for any observed discrepancies and, if possible, address them (e.g., through minor implementation changes). We explicitly encourage authors to not focus on a single paper/artifact only, but instead to perform a comparative experiment of multiple related approaches.

In particular, replicability studies should follow the ACM guidelines on replicability (different team, different experimental setup): The measurement can be obtained with stated precision by a different team, a different measuring system, in a different location on multiple trials. For computational experiments, this means that an independent group can obtain the same result using artifacts which they develop completely independently. This means that it is also insufficient to focus on reproducibility (i.e., different team, same experimental setup) alone. Replicability Studies will be evaluated according to the following standards:

  • Depth and breadth of experiments
  • Clarity of writing
  • Appropriateness of conclusions
  • Amount of useful, actionable insights
  • Availability of artifacts

We expect replicability studies to clearly point out the artifacts the study is built on, and to submit those artifacts to artifact evaluation (see below). Artifacts evaluated positively will be eligible to obtain the prestigious Results Reproduced badge.

Submission Guidelines

Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for ISSTA. Authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions. More details are available at the Submission Policies page.

Research and Experience Papers as well as Replicability Studies should be at most 10 pages in length, with at most 2 additional pages for references. Experience papers and replicability studies should clearly specify their category in the paper title upon submission, e.g., “XXX (Experience Paper)”. All authors should use the official “ACM Master article template”, which can be obtained from the ACM Proceedings Template pages. Latex users should use the “sigconf” option, as well as the “review” (to produce line numbers for easy reference by the reviewers) and “anonymous” (omitting author names) options. To that end, the following latex code can be placed at the start of the latex document:

\documentclass[sigconf,review, anonymous]{acmart}
\acmConference[ISSTA 2022]{ACM SIGSOFT International Symposium on Software Testing and Analysis}{18-22 July, 2022}{Daejeon, South Korea}

Submit your papers via the HotCRP ISSTA 2022 submission website.

Double-blind Reviewing

ISSTA 2022 will conduct double-blind reviewing. Submissions should not reveal the identity of the authors in any way. Authors should leave out author names and affiliations from the body of their submission. They should also ensure that any citations to related work by themselves are written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.

Double-blind reviewing should not hinder the usual communication of results. But, during the review period, please don’t broadcast the work on social media. Also, to the extent possible, consider not publishing preprints of your work during or right before the review period.

Authors with further questions on double-blind reviewing are encouraged to contact the Program Chair by email.

Supplementary Material

Authors are free to provide supplementary material if that material supports the claims in the paper. Such material may include proofs, experimental results, and/or data sets. This material should be uploaded at the same time as the submission. Any supplementary material must also be anonymized. Reviewers are not required to examine the supplementary material but may refer to it if they would like to find further evidence supporting the claims in the paper. Please prepare the supplementary material in the PDF format.

Author Responses

Reviews will be followed by an author response. After the response, some papers may receive additional reviews, if necessary, to which authors can respond in a second author-response phase.

Visa Policy

In cases where the travel Visa is rejected or delayed for a long time (e.g., due to additional checks) so that the authors are not able to attend the conference despite best efforts, alternative presentation methods will be considered. However, the authors should notify the program chair at least one week before the conference and provide proof of visa being applied in time.