VenueSan Francisco Marriott Marquis
Room nameGolden Gate C3
Floor0
Room InformationNo extra information available
Program

You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 5 Dec

Displayed time zone: Pacific Time (US & Canada) change

11:00 - 12:30
Automated Repair IResearch Papers / Industry Papers at Golden Gate C3
Chair(s): Shin Hwei Tan Concordia University
11:00
15m
Talk
RAP-Gen: Retrieval-Augmented Patch Generation with CodeT5 for Automatic Program Repair
Research Papers
Weishi Wang Nanyang Technological University, Yue Wang Salesforce Research, Shafiq Joty Salesforce Research, Steven C.H. Hoi Salesforce Research Asia
Media Attached
11:15
15m
Talk
From Leaks to Fixes: Automated Repairs for Resource Leak Warnings
Research Papers
Akshay Utture Uber Technologies Inc., Jens Palsberg University of California, Los Angeles (UCLA)
Pre-print Media Attached
11:30
15m
Talk
InferFix: End-to-End Program Repair with LLMs
Industry Papers
Matthew Jin , Syed Shahriar University of California at Los Angeles, Michele Tufano Microsoft, Xin Shi Microsoft Corporation, Shuai Lu Microsoft Research, Neel Sundaresan Microsoft, Alexey Svyatkovskiy Microsoft
DOI
11:45
15m
Research paper
Copiloting the Copilots: Fusing Large Language Models with Completion Engines for Automated Program Repair
Research Papers
Yuxiang Wei University of Illinois at Urbana-Champaign, Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print Media Attached
12:00
15m
Talk
SmartFix: Fixing Vulnerable Smart Contracts by Accelerating Generate-and-Verify Repair using Statistical Models
Research Papers
Sunbeom So Korea University, Hakjoo Oh Korea University
Media Attached
12:15
15m
Talk
Automatically Resolving Dependency-Conflict Building Failures via Behavior-Consistent Loosening of Library Version Constraints
Research Papers
Huiyan Wang Nanjing University, Shuguan Liu Nanjing University, Lingyu Zhang Nanjing University, Chang Xu Nanjing University
Media Attached
14:00 - 15:30
Program Analysis IResearch Papers / Demonstrations / Industry Papers at Golden Gate C3
Chair(s): Michael Pradel University of Stuttgart
14:00
15m
Talk
An Automated Approach to Extracting Local Variables
Research Papers
Xiaye Chi Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Weixiao Wang Beijing Institute of Technology, Yunni Xia Chongqing University, Yanjie Jiang Peking University, Yuxia Zhang Beijing Institute of Technology, Weixing Ji Beijing Institute of Technology
Media Attached
14:15
15m
Talk
Incrementalizing Production CodeQL Analyses
Industry Papers
Tamás Szabó GitHub Next
DOI Media Attached
14:30
15m
Talk
Statistical Reachability Analysis
Research Papers
Seongmin Lee Max Planck Institute for Security and Privacy (MPI-SP), Marcel Böhme Max Planck Institute for Security and Privacy
Media Attached
14:45
15m
Talk
PPR: Pairwise Program Reduction
Research Papers
Mengxiao Zhang University of Waterloo, Zhenyang Xu University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology; University of Waterloo, Yu Jiang Tsinghua University, Chengnian Sun University of Waterloo
Media Attached
15:00
15m
Talk
When Function Inlining Meets WebAssembly: Counterintuitive Impacts on Runtime Performance
Research Papers
Alan Romano University of Southern California, Weihang Wang University of Southern California
Pre-print Media Attached
15:15
7m
Talk
Ad Hoc Syntax-Guided Program Reduction
Demonstrations
Jia Le Tian University of Waterloo, Mengxiao Zhang University of Waterloo, Zhenyang Xu University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology; University of Waterloo, Yiwen Dong , Chengnian Sun University of Waterloo
Media Attached
16:00 - 18:00
Fault Diagnosis and Root Cause Analysis IResearch Papers / Journal First / Industry Papers at Golden Gate C3
Chair(s): Akond Rahman Auburn University
16:00
15m
Talk
[Remote] Nezha: Interpretable Fine-Grained Root Causes Analysis for Microservices on Multi-Modal Observability Data
Research Papers
Guangba  Yu Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Yufeng Li Sun Yat-sen University, Hongyang Chen School of Computer Science and Engineering, Sun Yat-sen University, Xiaoyun Li Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
Pre-print
16:15
15m
Full-paper
[Remote] DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems
Research Papers
Zhiming Chen Sun Yat-sen University, Pengfei Chen Sun Yat-Sen University, Guangba  Yu Sun Yat-Sen University, Zilong He Sun Yat-Sen University, Genting Mai Sun Yat-sen University, Peipei Wang ByteDance Infrastructure System Lab
Pre-print Media Attached
16:30
15m
Talk
[Remote] Pre-training Code Representation with Semantic Flow Graph for Effective Bug Localization
Research Papers
Yali Du Shandong University, Zhongxing Yu Shandong University
Media Attached
16:45
15m
Talk
[Remote] A Practical Human Labeling Method for Online Just-in-Time Software Defect Prediction
Research Papers
Liyan Song Southern University of Science and Technology, China, Leandro Minku University of Birmingham, Cong Teng Southern University of Science and Technology, Xin Yao Southern University of Science and Technology
Pre-print Media Attached
17:00
15m
Talk
Trace Diagnostics for Signal-Based Temporal Properties
Journal First
Chaima Boufaied University of Ottawa, Claudio Menghi University of Bergamo; McMaster University, Domenico Bianculli University of Luxembourg, Lionel Briand University of Ottawa, Canada / University of Luxembourg, Luxembourg
Media Attached
17:15
15m
Talk
TraceDiag: Adaptive, Interpretable, and Efficient Root Cause Analysis on Large-Scale Microservice Systems
Industry Papers
Ruomeng Ding Microsoft, Chaoyun Zhang Microsoft, Lu Wang Microsoft Research, Yong Xu Microsoft Research, Minghua Ma Microsoft Research, Xiaomin Wu Microsoft, Meng Zhang , Qingjun Chen Microsoft 365, Xin Gao Microsoft 365, Xuedong Gao Microsoft 365, Hao Fan , Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research
DOI Media Attached
17:30
15m
Talk
Triggering Modes in Spectrum-Based Multi-location Fault Localization
Industry Papers
Tung Dao Cvent, Na Meng Virginia Tech, ThanhVu Nguyen George Mason University
DOI Media Attached
17:45
15m
Talk
Automata-based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android
Research Papers
Enze Ma East China Normal University, Shan Huang East China Normal University, weigang he East China Normal University, Ting Su East China Normal University, Jue Wang Nanjing University, Huiyu Liu East China Normal University, Geguang Pu East China Normal University, Zhendong Su ETH Zurich
Media Attached

Wed 6 Dec

Displayed time zone: Pacific Time (US & Canada) change

11:00 - 12:30
Program Analysis IIResearch Papers / Journal First at Golden Gate C3
Chair(s): Nico Rosner Amazon Web Services
11:00
15m
Talk
[Remote] OOM-Guard: Towards Improving The Ergonomics of Rust OOM Handling via A Reservation-based Approach
Research Papers
Chengjun Chen Fudan University; Ant Group, Zhicong Zhang Fudan University, Hongliang Tian Ant Group, Shoumeng Yan Ant Group, Hui Xu Fudan University
Media Attached
11:15
15m
Talk
[Remote] DeepInfer: Deep Type Inference from Smart Contract Bytecode
Research Papers
Kunsong Zhao The Hong Kong Polytechnic University, Zihao Li The Hong Kong Polytechnic Universituy, Jianfeng Li Xi’an Jiaotong University, He Ye KTH Royal Institute of Technology, Xiapu Luo Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China
Media Attached
11:30
15m
Talk
Statistical Type Inference for Incomplete Programs
Research Papers
Yaohui Peng School of Computer Science, Wuhan University, Jing Xie School of Computer Science, Wuhan University, Qiongling Yang School of Computer Science, Wuhan University, Hanwen Guo School of Computer Science, Wuhan University, Qingan Li School of Computer Science, Wuhan University, Jingling Xue School of Computer Science and Engineering, UNSW Sydney, YUAN Mengting School of Computer Science, Wuhan University, Wuhan, China
Media Attached
11:45
15m
Talk
Demystifying Hidden Sensitive Operations in Android apps
Journal First
Xiaoyu Sun Australian National University, Australia, Xiao Chen Monash University, Li Li Beihang University, Haipeng Cai Washington State University, John Grundy Monash University, Jordan Samhi University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
Media Attached
12:00
15m
Talk
DeMinify: Neural Variable Name Recovery and Type Inference
Research Papers
Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas
Media Attached
14:00 - 15:30
Security IResearch Papers / Demonstrations / Journal First at Golden Gate C3
Chair(s): Abhik Roychoudhury National University of Singapore
14:00
15m
Talk
Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study
Journal First
Goran Piskachev Amazon Web Services, Matthias Becker Fraunhofer IEM, Eric Bodden University of Paderborn
Media Attached
14:15
15m
Talk
Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects
Research Papers
Lida Zhao Singapore Management University, Singapore, Sen Chen College of Intelligence and Computing, Tianjin University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Lyuye Zhang Nanyang Technological University, Wu Jiahui Nanyang Technological University, Jun Sun Singapore Management University, Yang Liu Nanyang Technological University
Media Attached
14:30
15m
Talk
Input-driven Dynamic Program Debloating for Code-reuse Attack Mitigation
Research Papers
Xiaoke Wang Wuhan University, Tao Hui Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Lei Zhao Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Yueqiang Cheng NIO
DOI Pre-print Media Attached
14:45
7m
Talk
MASC: A Tool for Mutation-based Evaluation of Static Crypto-API Misuse Detectors
Demonstrations
Amit Seal Ami William & Mary, Syed Yusuf Ahmed University of Dhaka, Radowan Mahmud Redoy University of Dhaka, Nathan Cooper William & Mary, Kaushal Kafle College of William & Mary, Kevin Moran University of Central Florida, Denys Poshyvanyk William & Mary, Adwait Nadkarni William & Mary
Media Attached
14:53
7m
Talk
[Remote] llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs
Demonstrations
Ruiling Chen Shenzhen University, Jiaxiang Liu Shenzhen University, Xiaomu Shi Institute of Software, Chinese Academy of Sciences, Ming-Hsien Tsai National Institute of Cyber Security, Bow-Yaw Wang , Bo-Yin Yang Academia Sinica
Media Attached
15:00
15m
Talk
[Remote] Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java
Research Papers
Kaixuan Li East China Normal University, Sen Chen College of Intelligence and Computing, Tianjin University, Lingling Fan College of Cyber Science, Nankai University, Ruitao Feng University of New South Wales, Han Liu East China Normal University, Chengwei Liu Nanyang Technological University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University
Pre-print Media Attached
15:15
15m
Talk
[Remote] TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts
Research Papers
Chenyang Ma Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University
DOI Pre-print Media Attached
16:00 - 18:00
Automated Repair IIJournal First / Research Papers at Golden Gate C3
Chair(s): Luciano Baresi Politecnico di Milano
16:00
15m
Talk
A Large-scale Empirical Review of Patch Correctness Checking Approaches
Research Papers
Jun Yang UIUC, Yuehan Wang University of Illinois at Urbana-Champaign, Yiling Lou Fudan University, Ming Wen Huazhong University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
Media Attached
16:15
15m
Talk
Program Repair Guided by Datalog-Defined Static Analysis
Research Papers
Yu Liu Beijing University of Technology, Sergey Mechtaev University College London, Pavle Subotic Microsoft, Abhik Roychoudhury National University of Singapore
Media Attached
16:30
15m
Talk
SynShine: Improved Fixing of Syntax Errors
Journal First
Toufique Ahmed University of California at Davis, Noah Rose Ledesma UC Davis, Prem Devanbu University of California at Davis
Media Attached
16:45
15m
Talk
Baldur: Whole-Proof Generation and Repair with Large Language Models
Research Papers
Emily First University of California, San Diego, Markus Rabe Google, Talia Ringer University of Illinois at Urbana-Champaign, Yuriy Brun University of Massachusetts
Media Attached
17:00
15m
Talk
KG4CraSolver: Recommending Crash Solutions via Knowledge Graph
Research Papers
Xueying Du Fudan University, Yiling Lou Fudan University, Mingwei Liu Fudan University, Xin Peng Fudan University, Tianyong Yang Fudan University
Pre-print Media Attached
17:15
15m
Talk
[Remote] Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps
Research Papers
Yuxin Zhang Tianjin University, Sen Chen College of Intelligence and Computing, Tianjin University, Lingling Fan College of Cyber Science, Nankai University, Chunyang Chen Monash University, Xiaohong Li Tianjin University
Media Attached
17:30
15m
Talk
[Remote] Semantic Test Repair for Web applications
Research Papers
Xiaofang Qi School of Computer Science and Engineering, Southeast University, Xiang Qian School of Computer Science and Engineering, Southeast University, Yanhui Li Nanjing University
Media Attached

Thu 7 Dec

Displayed time zone: Pacific Time (US & Canada) change

11:00 - 12:30
Program Analysis IIIDemonstrations / Research Papers / Industry Papers at Golden Gate C3
Chair(s): Marsha Chechik University of Toronto
11:00
15m
Talk
Practical Inference of Nullability Types
Research Papers
Nima Karimipour University of California, Riverside, Justin Pham University of California, Riverside, Lazaro Clapp Uber Technologies Inc, Manu Sridharan University of California at Riverside
Media Attached
11:15
15m
Talk
LibKit: Detecting Third-Party Libraries in iOS Apps
Research Papers
Daniel Dominguez Alvarez University of Verona and IMDEA Software Institute, Alejandro de la Cruz IMDEA Software Institute, Alessandra Gorla IMDEA Software Institute, Juan Caballero IMDEA Software Institute
Media Attached
11:30
15m
Talk
Compositional Taint Analysis for Enforcing Security Policies at Scale
Industry Papers
Subarno Banerjee Amazon Web Services, Siwei Cui Texas A & M University, Michael Emmi Amazon Web Services, Antonio Filieri Amazon Web Services, Liana Hadarean Amazon Web Services, Peixuan Li Amazon Web Services, Linghui Luo Amazon Web Services, Goran Piskachev Amazon Web Services, Nico Rosner Amazon Web Services, Aritra Sengupta Amazon Web Services, Omer Tripp Amazon, Jingbo Wang University of Southern California
DOI Media Attached
11:45
15m
Talk
FunProbe: Probing Functions from Binary Code through Probabilistic Analysis
Research Papers
Soomin Kim KAIST, Hyungseok Kim The Affiliated Institute of ETRI, Sang Kil Cha KAIST, South Korea
Media Attached
12:00
15m
Talk
BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework
Research Papers
Zewen Sun Nanjing University, Duanchen Xu Nanjing University, Yiyu Zhang Nanjing University, Yun Qi Nanjing University, Yueyang Wang Nanjing University, Zhiqiang Zuo Nanjing University, Zhaokang Wang Nanjing University, Yue Li Nanjing University, Xuandong Li Nanjing University, Qingda Lu Alibaba Group, Wenwen Peng Alibaba Group, Shengjian (Daniel) Guo Baidu Security
Media Attached
12:15
7m
Talk
CONAN: Statically Detecting Connectivity Issues in Android Applications
Demonstrations
Alejandro Mazuera-Rozo Universita della Svizzera italiana, Lugano, Switzerland and Universidad de los Andes, Colombia, Camilo Escobar-Velásquez Universidad de los Andes, Juan Espitia-Acero Universidad de los Andes, Colombia, Mario Linares-Vásquez Universidad de los Andes, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
Media Attached
14:00 - 15:30
Security IIResearch Papers / Journal First at Golden Gate C3
Chair(s): Caroline Lemieux University of British Columbia
14:00
15m
Talk
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors
Research Papers
Ruoxi Sun CSIRO's Data61, Jason Minhui Xue CSIRO’s Data61, Gareth Tyson Hong Kong University of Science and Technology, Tian Dong Shanghai Jiao Tong University, Shaofeng Li Shanghai Jiao Tong University, Shuo Wang CSIRO's Data61, Haojin Zhu Shanghai Jiao Tong University, Seyit Camtepe CSIRO Data61, Surya Nepal CSIRO’s Data61
Media Attached
14:15
15m
Talk
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study
Journal First
Akond Rahman Auburn University, USA, Shazibul Islam Shamim Auburn University, Dibyendu Brinto Bose Virginia Tech, Rahul Pandita GitHub, Inc.
Media Attached
14:30
15m
Talk
Crystallizer: A Hybrid Path Analysis Framework To Aid in Uncovering Deserialization Vulnerabilities
Research Papers
Prashast Srivastava Columbia University, USA, Flavio Toffalini EPFL, Kostyantyn Vorobyov Oracle Labs, Australia, François Gauthier Oracle Labs, Antonio Bianchi Purdue University, Mathias Payer EPFL
Media Attached
14:45
15m
Talk
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code
Journal First
Zimin Chen KTH Royal Institute of Technology, Steve Kommrusch Leela AI, Martin Monperrus KTH Royal Institute of Technology
Media Attached
15:00
15m
Talk
ViaLin: Path-Aware Dynamic Taint Analysis for Android
Research Papers
Khaled Ahmed University of British Columbia (UBC), Yingying Wang University of British Columbia, Mieszko Lis The University of British Columbia, Canada, Julia Rubin University of British Columbia, Canada
Media Attached
15:15
15m
Talk
[Remote] Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation
Research Papers
Chao Ni School of Software Technology, Zhejiang University, Xin Yin The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Kaiwen Yang College of Computer Science and Technology, Zhejiang University, Dehai Zhao Australian National University, Australia, Zhenchang Xing Data61, Xin Xia Huawei Technologies
Media Attached

Tue 5 Dec

Displayed time zone: Pacific Time (US & Canada) change

Room11:0015304512:0015304513:0015304514:0015304515:0015304516:0015304517:00153045
Golden Gate C3

Wed 6 Dec

Displayed time zone: Pacific Time (US & Canada) change

Room11:0015304512:0015304513:0015304514:0015304515:0015304516:0015304517:00153045
Golden Gate C3