Abstract is missing.
- Closing the Gap: A User Study on the Real-world Usefulness of AI-powered Vulnerability Detection & Repair in the IDEBenjamin Steenhoek, Kalpathy Sivaraman, Renata Saldivar Gonzalez, Yevhen Mohylevskyy, Roshanak Zilouchian Moghaddam, Wei Le. 1-13 [doi]
- AssetHarvester: A Static Analysis Tool for Detecting Secret-Asset Pairs in Software ArtifactsSetu Kumar Basak, K. Virgil English, Ken Ogura, Vitesh Kambara, Bradley Reaves, Laurie A. Williams. 1-13 [doi]
- Repository-Level Graph Representation Learning for Enhanced Security Patch DetectionXin-Cheng Wen, Zirui Lin, Cuiyun Gao 0001, Hongyu Zhang 0002, Yong Wang, Qing Liao 0001. 1-13 [doi]
- Decictor: Towards Evaluating the Robustness of Decision-Making in Autonomous Driving SystemsMingfei Cheng, Xiaofei Xie, Yuan Zhou 0005, Junjie Wang 0007, Guozhu Meng, Kairui Yang. 1-13 [doi]
- SpecGen: Automated Generation of Formal Program Specifications via Large Language ModelsLezhi Ma, Shangqing Liu, Yi Li 0008, Xiaofei Xie, Lei Bu. 16-28 [doi]
- Gpass: A Goal-Adaptive Neural Theorem Prover Based on Coq for Automated Formal VerificationYizhou Chen, Zeyu Sun 0004, Guoqing Wang 0004, Dan Hao 0001. 29-41 [doi]
- Formally Verified Binary-Level Pointer AnalysisFreek Verbeek, Ali Shokri 0004, Daniel Engel, Binoy Ravindran. 42-53 [doi]
- EffBT: An Efficient Behavior Tree Reactive Synthesis and Execution FrameworkZiji Wu, Yu Huang, Peishan Huang, Shanghua Wen, Minglong Li, Ji Wang 0001. 54-65 [doi]
- An Empirical Study on Package-Level Deprecation in Python EcosystemZhiqing Zhong, Shilin He, Haoxuan Wang, Boxi Yu, Haowen Yang, Pinjia He. 66-77 [doi]
- Datalog-Based Language-Agnostic Change Impact Analysis for MicroservicesQingkai Shi, Xiaoheng Xie, Xianjin Fu, Peng Di, Huawei Li, Ang Zhou, Gang Fan. 78-89 [doi]
- GenC2Rust: Towards Generating Generic Rust Code from CXiafa Wu, Brian Demsky. 90-102 [doi]
- Instrumentation-Driven Evolution-Aware Runtime VerificationKevin Guan, Owolabi Legunsen. 103-115 [doi]
- Moye: A Wallbreaker for Monolithic FirmwareJintao Huang, Kai Yang, Gaosheng Wang, Zhiqiang Shi, Zhiwen Pan, Shichao Lv, Limin Sun 0001. 116-128 [doi]
- Understanding and Detecting Peer Dependency Resolving Loop in npm EcosystemXingyu Wang, Mingsen Wang, Wenbo Shen, Rui Chang. 129-140 [doi]
- Critical Variable State-Aware Directed Greybox FuzzingXu Chen, Ningning Cui, Zhe Pan, Liwei Chen, Gang Shi, Dan Meng. 141-152 [doi]
- LWDIFF: an LLM-Assisted Differential Testing Framework for Webassembly RuntimesShiYao Zhou, Jincheng Wang, He Ye, Hao Zhou 0009, Claire Le Goues, Xiapu Luo. 153-164 [doi]
- No Harness, No Problem: Oracle-guided Harnessing for Auto-generating C API Fuzzing HarnessesGabriel Sherman, Stefan Nagy. 165-177 [doi]
- Parametric Falsification of Many Probabilistic Requirements Under FlakinessMatteo Camilli, Raffaela Mirandola. 178-190 [doi]
- RediI: Test Infrastructure to Enable Deterministic Reproduction of Failures for Distributed SystemsYang Feng 0003, Zheyuan Lin, Dongchen Zhao, Mengbo Zhou, Jia Liu, James A. Jones. 191-203 [doi]
- Automated Generation of Accessibility Test Reports from Recorded User TranscriptsSyed Fatiul Huq, Mahan Tafreshipour, Kate Kalcevich, Sam Malek. 204-216 [doi]
- Fuzzing MLIR Compilers with Custom Mutation SynthesisBen Limpanukorn, Jiyuan Wang, Hong Jin Kang, Eric Zitong Zhou, Miryung Kim. 217-229 [doi]
- Insvdf: Interface-State-Aware Virtual Device FuzzingZexiang Zhang, Gaoning Pan, Ruipeng Wang, Yiming Tao, Zulie Pan, Cheng Tu, Min Zhang, Yang Li, Yi Shen, Chunming Wu 0001. 230-241 [doi]
- Reduce Dependence for Sound Concurrency Bug PredictionShihao Zhu, Yuqi Guo 0002, Yan Cai 0001, Bin Liang, Long Zhang, Rui Chen, Tingting Yu. 242-254 [doi]
- Sand: Decoupling Sanitization from Fuzzing for Low OverheadZiqiao Kong, Shaohua Li 0002, Heqing Huang 0002, Zhendong Su 0001. 255-267 [doi]
- TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability CodeSiyuan Li, Yuekang Li, Zuxin Chen, Chaopeng Dong, Yongpan Wang, Hong Li, Yongle Chen, Hongsong Zhu. 268-280 [doi]
- A Multiple Representation Transformer with Optimized Abstract Syntax Tree for Efficient Code Clone DetectionTianchen Yu, Li Yuan, Liannan Lin, Hongkui He. 281-293 [doi]
- Can an LLM Find Its Way Around a Spreadsheet?Cho-Ting Lee, Andrew Neeser, Shengzhe Xu, Jay Katyan, Patrick Cross, Sharanya Pathakota, Marigold Norman, John Simeone, Jaganmohan Chandrasekaran, Naren Ramakrishnan. 294-306 [doi]
- QEDCartographer: Automating Formal Verification Using Reward-Free Reinforcement LearningAlex Sanchez-Stern, Abhishek Varghese, Zhanna Kaufman, Shizhuo Dylan Zhang, Talia Ringer, Yuriy Brun. 307-320 [doi]
- TIGER: A Generating-Then-Ranking Framework for Practical Python Type InferenceChong Wang 0013, Jian Zhang, Yiling Lou, Mingwei Liu 0002, Weisong Sun, Yang Liu, Xin Peng 0001. 321-333 [doi]
- ROCODE: Integrating Backtracking Mechanism and Program Analysis in Large Language Models for Code GenerationXue Jiang, Yihong Dong, Yongding Tao, Huanyu Liu, Zhi Jin, Ge Li 0001. 334-346 [doi]
- Rango: Adaptive Retrieval-Augmented Proving for Automated Software VerificationKyle Thompson, Nuno Saavedra, Pedro Carrott, Kevin Fisher, Alex Sanchez-Stern, Yuriy Brun, João F. Ferreira 0001, Sorin Lerner, Emily First. 347-359 [doi]
- A Differential Testing Framework to Identify Critical AV Failures Leveraging Arbitrary InputsTrey Woodlief, Carl Hildebrandt, Sebastian G. Elbaum. 360-372 [doi]
- Automating a Complete Software Test Process Using LLMs: An Automotive Case StudyShuai Wang, Yinan Yu, Robert Feldt, Dhasarathy Parthasarathy. 373-384 [doi]
- LLM-Agents Driven Automated Simulation Testing and Analysis of small Uncrewed Aerial SystemsVenkata Sai Aswath Duvvuru, Bohan Zhang, Michael Vierhauser, Ankit Agrawal 0002. 385-397 [doi]
- Efficient Domain Augmentation for Autonomous Driving Testing Using Diffusion ModelsLuciano Baresi, Davide Yi Xian Hu, Andrea Stocco 0001, Paolo Tonella. 398-410 [doi]
- GARL: Genetic Algorithm-Augmented Reinforcement Learning to Detect Violations in Marker-Based Autonomous Landing SystemsLinfeng Liang, Yao Deng, Kye Morton, Valtteri Kallinen, Alice James, Avishkar Seth, Endrowednes Kuantama, Subhas Mukhopadhyay, Richard Han 0001, Xi Zheng. 411-423 [doi]
- Does GenAI Make Usability Testing Obsolete?Ali Ebrahimi Pourasad, Walid Maalej. 437-449 [doi]
- Feature-Driven End-to-End Test GenerationParsa Alian, Noor Nashid, Mobina Shahbandeh, Taha Shabani, Ali Mesbah 0001. 450-462 [doi]
- SeeAction: Towards Reverse Engineering How-What-Where of HCI Actions from Screencasts for UI AutomationDehai Zhao, Zhenchang Xing, Qinghua Lu 0001, Xiwei Xu 0001, Liming Zhu 0001. 463-475 [doi]
- Synthesizing Document Database Queries Using Collection AbstractionsQikang Liu, Yang He, Yanwen Cai, Byeongguk Kwak, Yuepeng Wang 0001. 476-488 [doi]
- The Power of Types: Exploring the Impact of Type Checking on Neural Bug Detection in Dynamically Typed LanguagesBoqi Chen, José Antonio Hernández López, Gunter Mussbacher, Dániel Varró. 489-501 [doi]
- A Test Oracle for Reinforcement Learning Software Based on Lyapunov Stability Control TheoryShiyu Zhang, Haoyang Song, Qixin Wang, Henghua Shen, Yu Pei 0001. 502-513 [doi]
- CodeImprove: Program Adaptation for Deep Code ModelsRavishka Rathnasuriya, Zijie Zhao, Wei Yang. 514-526 [doi]
- Fairquant: Certifying and Quantifying Fairness of Deep Neural NetworksBrian Hyeongseok Kim, Jingbo Wang, Chao Wang. 527-539 [doi]
- Calibration and Correctness of Language Models for CodeClaudio Spiess, David Gros 0001, Kunal Suresh Pai, Michael Pradel, Md. Rafiqul Islam Rabin, Amin Alipour, Susmit Jha, Prem Devanbu, Toufique Ahmed. 540-552 [doi]
- An Empirical Study on Commit Message Generation Using LLMs via In-Context LearningYifan Wu, Yunpeng Wang, Ying Li, Wei Tao, Siyu Yu, Haowen Yang, Wei Jiang 0011, Jianguo Li. 553-565 [doi]
- Instruct or Interact? Exploring and Eliciting LLMs' Capability in Code Snippet Adaptation Through Prompt EngineeringTanghaoran Zhang, Yue Yu 0001, XinJun Mao, Shangwen Wang, Kang Yang, Yao Lu, Zhang Zhang, Yuxin Zhao. 566-577 [doi]
- Search-Based LLMs for Code OptimizationShuzheng Gao, Cuiyun Gao 0001, Wenchao Gu, Michael R. Lyu. 578-590 [doi]
- Towards Better Answers: Automated Stack Overflow Post UpdatingYubo Mai, Zhipeng Gao, Haoye Wang, Tingting Bi, Xing Hu 0008, Xin Xia 0001, Jianling Sun. 591-603 [doi]
- Unseen Horizons: Unveiling the Real Capability of LLM Code Generation Beyond the FamiliarYuanliang Zhang, Yifan Xie, Shanshan Lit, Ke Liu, Chong Wang, Zhouyang Jia, Xiangbing Huang, Jie Song, Chaopeng Luo, Zhizheng Zheng, Rulin Xu, Yitong Liu, Si Zheng, Xiangke Liao. 604-615 [doi]
- ConsCS: Effective and Efficient Verification of Circom CircuitsJinan Jiang, Xinghao Peng, Jinzhao Chu, Xiapu Luo. 616-628 [doi]
- Constrained LTL Specification Learning from ExamplesChangjian Zhang, Parv Kapoor, Ian Dardik, Leyi Cui, Rômulo Meira-Góes, David Garlan, Eunsuk Kang. 629-641 [doi]
- LLM-Aided Automatic Modeling for Security Protocol VerificationZiyu Mao, Jingyi Wang, Jun Sun, Shengchao Qin, Jiawen Xiong. 642-654 [doi]
- Thanos: DBMS Bug Detection via Storage Engine Rotation Based Differential TestingYing Fu, Zhiyong Wu 0010, Yuanliang Zhang, Jie Liang, Jingzhou Fu, Yu Jiang 0001, Shanshan Li, Xiangke Liao. 655-666 [doi]
- Thanos: DBMS Bug Detection via Storage Engine Rotation Based Differential TestingYing Fu, Zhiyong Wu 0010, Yuanliang Zhang, Jie Liang, Jingzhou Fu, Yu Jiang, Shanshan Li, Xiangke Liao. 655-666 [doi]
- Coni: Detecting Database Connector Bugs via State-Aware Test Case GenerationWenqian Deng, Jie Liang, Zhiyong Wu 0010, Jingzhou Fu, Mingzhe Wang, Yu Jiang. 667-678 [doi]
- PUPPY: Finding Performance Degradation Bugs in DBMSs via Limited-Optimization Plan ConstructionZhiyong Wu 0010, Jie Liang 0006, Jingzhou Fu, Mingzhe Wang, Yu Jiang 0001. 679-690 [doi]
- Enhancing Fault Localization in Industrial Software Systems via Contrastive LearningChun Li, Hui Li, Zhong Li, Minxue Pan, Xuandong Li. 691-703 [doi]
- Who's Pushing the Code? An Exploration of GitHub ImpersonationYueke Zhang, Anda Liang, Xiaohan Wang, Pamela Wisniewski, Fengwei Zhang, Kevin Leach, Yu Huang. 704-716 [doi]
- Investigating the Impact of Interpersonal Challenges on Feeling Welcome in OSSBianca Trinkenreich, Zixuan Feng, Rudrajit Choudhuri, Marco Aurélio Gerosa, Anita Sarma, Igor Steinmacher. 717-729 [doi]
- Understanding the Effectiveness of Coverage Criteria for Large Language Models: A Special Angle from Jailbreak AttacksShide Zhou, Tianlin Li, Kailong Wang 0001, Yihao Huang 0001, Ling Shi, Yang Liu, Haoyu Wang 0001. 730-742 [doi]
- Diversity Drives Fairness: Ensemble of Higher Order Mutants for Intersectional Fairness of Machine Learning SoftwareZhenpeng Chen, Xinyue Li, Jie M. Zhang, Federica Sarro, Yang Liu. 743-755 [doi]
- HIFI: Explaining and Mitigating Algorithmic Bias Through the Lens of Game-Theoretic InteractionsLingFeng Zhang, Zhaohui Wang, Yueling Zhang, Min Zhang 0002, Jiangtao Wang 0009. 756-768 [doi]
- Towards More Trustworthy Deep Code Models by Enabling Out-of-Distribution DetectionYanfu Yan, Viet Duong, Huajie Shao, Denys Poshyvanyk. 769-781 [doi]
- FairSense: Long-Term Fairness Analysis of ML-Enabled SystemsYining She, Sumon Biswas, Christian Kästner, Eunsuk Kang. 782-794 [doi]
- A Little Goes a Long Way: Tuning Configuration Selection for Continuous Kernel FuzzingSanan Hasanov, Stefan Nagy, Paul Gazzillo. 795-807 [doi]
- Exploring the Robustness of the Effect of EVO on Intention Valuation Through ReplicationYesugen Baatartogtokh, Kaitlyn Cook, Alicia M. Grubb. 808-820 [doi]
- Unavoidable Boundary Conditions: a Control Perspective on Goal ConflictsFrancisco Cirelli, Dalal Alrajeh, Sebastián Uchitel. 821-832 [doi]
- User Personas Improve Social Sustainability by Encouraging Software Developers to Deprioritize Antisocial FeaturesBimpe Ayoola, Miikka Kuutila, Rina R. Wehbe, Paul Ralph. 833-845 [doi]
- Neurosymbolic Modular Refinement Type InferenceGeorgios Sakkas, Pratyush Sahu, Kyeling Ong, Ranjit Jhala. 846-858 [doi]
- An Empirical Study on Automatically Detecting AI-Generated Source Code: How Far are We?Hyunjae Suh, Mahan Tafreshipour, Jiawei Li, Adithya Bhattiprolu, Iftekhar Ahmed 0001. 859-871 [doi]
- Planning a Large Language Model for Static Detection of Runtime Errors in Code SnippetsSmit Patel, Aashish Yadavally, Hridya Dhulipala, Tien N. Nguyen. 872-884 [doi]
- LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-Based Code CompletionChong Wang, Kaifeng Huang 0001, Jian Zhang, Yebo Feng, Lyuye Zhang, Yang Liu 0003, Xin Peng 0001. 885-897 [doi]
- Knowledge-Enhanced Program Repair for Data Science CodeShuyin OuYang, Jie M. Zhang, Zeyu Sun 0004, Albert Meroño-Peñuela. 898-910 [doi]
- ADAMAS: Adaptive Domain-Aware Performance Anomaly Detection in Cloud Service SystemsWenwei Gu, Jiazhen Gu, Jinyang Liu, Zhuangbin Chen, Jianping Zhang, Jinxi Kuang, Cong Feng, Yongqiang Yang, Michael R. Lyu. 911-923 [doi]
- LibreLog: Accurate and Efficient Unsupervised Log Parsing Using Open-Source Large Language ModelsZeyang Ma, Dong Jae Kim, Tse-Hsun Peter Chen. 924-936 [doi]
- Model Editing for LLMs4Code: How Far are we?Xiaopeng Li 0006, Shangwen Wang, Shasha Li 0001, Jun Ma 0015, Jie Yu, Xiaodong Liu 0004, Jing Wang, Bin Ji 0002, Weimin Zhang. 937-949 [doi]
- Software Model Evolution with Large Language Models: Experiments on Simulated, Public, and Industrial DatasetsChristof Tinnes, Alisa Welter, Sven Apel. 950-962 [doi]
- SpecRover: Code Intent Extraction via LLMsHaifeng Ruan, Yuntong Zhang 0002, Abhik Roychoudhury. 963-974 [doi]
- Unleashing the True Potential of Semantic-Based Log Parsing with Pre-Trained Language ModelsVan-Hoang Le, Yi Xiao, Hongyu Zhang. 975-987 [doi]
- Faster Configuration Performance Bug Testing with Neural Dual-Level PrioritizationYoupeng Ma, Tao Chen, Ke Li. 988-1000 [doi]
- Metamorphic-Based Many-Objective Distillation of LLMs for Code-Related TasksAnnibale Panichella. 1001-1013 [doi]
- NIODebugger: A Novel Approach to Repair Non-Idempotent-Outcome Tests with LLM-Based AgentKaiyao Ke. 1014-1025 [doi]
- Test Intention Guided LLM-Based Unit Test GenerationZifan Nan, Zhaoqiang Guo, Kui Liu 0001, Xin Xia 0001. 1026-1038 [doi]
- What You See is What You Get: Attention-Based Self-Guided Automatic Unit Test GenerationXin Yin, Chao Ni 0001, Xiaodan Xu, Xiaohu Yang 0001. 1039-1051 [doi]
- An Empirical Study on Reproducible Packaging in Open-Source EcosystemsGiacomo Benedetti, Oreofe Solarin, Courtney Miller, Greg Tystahl, William Enck, Christian Kästner, Alexandros Kapravelos, Alessio Merlo, Luca Verderame. 1052-1063 [doi]
- An Extensive Empirical Study of Nondeterministic Behavior in Static Analysis ToolsMiao Miao 0001, Austin Mordahl, Dakota Soles, Alice Beideck, Shiyi Wei. 1064-1076 [doi]
- Execution Trace Reconstruction Using Diffusion-Based Generative ModelsMadeline Janecek, Naser Ezzati Jivan, Abdelwahab Hamou-Lhadj. 1077-1088 [doi]
- Interactive Cross-Language Pointer Analysis for Resolving Native Code in Java ProgramsChenxi Zhang, Yufei Liang, Tian Tan 0001, Chang Xu, Shuangxiang Kan, Yulei Sui, Yue Li 0006. 1089-1100 [doi]
- Static Analysis of Remote Procedure Call in Java ProgramsBaoquan Cui, Rong Qu, Zhen Tang, Jian Zhang. 1101-1113 [doi]
- Large Language Models for Safe MinimizationAashish Yadavally, Xiaokai Rong, Phat Nguyen, Tien N. Nguyen. 1114-1126 [doi]
- Intention is All you Need: Refining your Code from your IntentionQi Guo, Xiaofei Xie, Shangqing Liu, Ming Hu 0003, Xiaohong Li 0001, Lei Bu. 1127-1139 [doi]
- RLCoder: Reinforcement Learning for Repository-Level Code CompletionYanlin Wang 0001, Yanli Wang, Daya Guo, Jiachi Chen, Ruikai Zhang, Yuchi Ma, Zibin Zheng. 1140-1152 [doi]
- INTERTRANS: Leveraging Transitive Intermediate Translations to Enhance LLM-Based Code TranslationMarcos Macedo, Yuan Tian 0008, Pengyu Nie 0001, Filipe Roseiro Côgo, Bram Adams. 1153-1164 [doi]
- A Large-Scale Study of Model Integration in ML-Enabled Software SystemsYorick Sens, Henriette Knopp, Sven Peldszus, Thorsten Berger. 1165-1177 [doi]
- Are LLMs Correctly Integrated into Software Systems?Yuchen Shao, Yuheng Huang 0004, Jiawei Shen, Lei Ma 0003, Ting Su 0001, Chengcheng Wan 0001. 1178-1190 [doi]
- Patch Synthesis for Property Repair of Deep Neural NetworksZhiming Chi, Jianan Ma, Pengfei Yang, Cheng-Chao Huang, Renjue Li, Jingyi Wang 0004, Xiaowe Huang, Lijun Zhang 0001. 1191-1203 [doi]
- Code Today, Deadline Tomorrow: Procrastination Among Software DevelopersZeinabsadat Saghi, Thomas Zimmermann 0001, Souti Chattopadhyay. 1204-1216 [doi]
- "Get Me in the Groove": a Mixed Methods Study on Supporting Adhd Professional ProgrammersKaia Newman, Sarah Snay, Madeline Endres, Manasvi Parikh, Andrew Begel. 1217-1229 [doi]
- Hints Help Finding and Fixing Bugs Differently in Python and Text-Based Program RepresentationsRuchit Rawal, Victor-Alexandru Padurean, Sven Apel, Adish Singla, Mariya Toneva. 1230-1242 [doi]
- How Scientists Use Jupyter Notebooks: Goals, Quality Attributes, and OpportunitiesRuanqianqian (Lisa) Huang, Savitha Ravi, Michael He, Boyu Tian, Sorin Lerner, Michael Coblenz. 1243-1255 [doi]
- Accounting for Missing Events in Statistical Information Leakage AnalysisSeongmin Lee 0001, Shreyas Minocha, Marcel Böhme. 1256-1267 [doi]
- Enhancing the Open Network: Definition and Automated Detection of Smart Contract DefectsHao Song, Teng Li, Jiachi Chen, Ting Chen 0002, Beibei Li, Zhangyan Lin, Yi Lu, Pan Li, Xihan Zhou. 1281-1293 [doi]
- $ZTD_{\text{JAVA}}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust DependenciesPaschal C. Amusuo, Kyle A. Robinson, Tanmay Singla, Huiyun Peng, Aravind Machiry, Santiago Torres-Arias, Laurent Simon, James C. Davis 0001. 1294-1306 [doi]
- FairChecker: Detecting Fund-Stealing Bugs in DeFi Protocols via Fairness ValidationYi Sun, Zhuo Zhang, Xiangyu Zhang. 1307-1319 [doi]
- An LLM-Based Agent-Oriented Approach for Automated Code Design Issue LocalizationFraol Batole, David O'Brien, Tien N. Nguyen, Robert Dyer 0001, Hridesh Rajan. 1320-1332 [doi]
- Distilled Lifelong Self-Adaptation for Configurable SystemsYulong Ye, Tao Chen 0001, Miqing Li. 1333-1345 [doi]
- COCA: Generative Root Cause Analysis for Distributed Systems with Code KnowledgeYichen Li 0003, Yulun Wu, Jinyang Liu 0002, Zhihan Jiang, Zhuangbin Chen, Guangba Yu, Michael R. Lyu. 1346-1358 [doi]
- Enhancing Code Generation via Bidirectional Comment-Level Mutual GroundingYifeng Di, Tianyi Zhang 0001. 1359-1371 [doi]
- HumanEvo: An Evolution-Aware Benchmark for More Realistic Evaluation of Repository-Level Code GenerationDewu Zheng, Yanlin Wang, Ensheng Shi, Ruikai Zhang, Yuchi Ma, Hongyu Zhang 0002, Zibin Zheng. 1372-1384 [doi]
- From Bugs to Benefits: Improving User Stories by Leveraging Crowd Knowledge with CrUISE-ACStefan Schwedt, Thomas Ströder. 1385-1395 [doi]
- LiSSA: Toward Generic Traceability Link Recovery Through Retrieval- Augmented GenerationDominik Fuchbeta, Tobias Hey 0001, Jan Keim, Haoyu Liu, Niklas Ewald, Tobias Thirolf, Anne Koziolek. 1396-1408 [doi]
- A Multi-Agent Approach for REST API Testing with Semantic Graphs and LLM-Driven InputsMyeongSoo Kim, Tyler Stennett, Saurabh Sinha, Alessandro Orso. 1409-1421 [doi]
- Clozemaster: Fuzzing Rust Compiler by Harnessing Llms for Infilling Masked Real ProgramsHongyan Gao, Yibiao Yang, Maolin Sun, Jiangchang Wu, Yuming Zhou, Baowen Xu. 1422-1435 [doi]
- LLM Based Input Space Partitioning Testing for Library APIsJiageng Li, Zhen Dong, Chong Wang, Haozhen You, Cen Zhang, Yang Liu, Xin Peng. 1436-1448 [doi]
- Leveraging Large Language Models for Enhancing the Understandability of Generated Unit TestsAmirhossein Deljouyi, Roham Koohestani, Maliheh Izadi, Andy Zaidman. 1449-1461 [doi]
- exLong: Generating Exceptional Behavior Tests with Large Language ModelsJiyang Zhang 0003, Yu Liu 0079, Pengyu Nie 0001, Junyi Jessy Li, Milos Gligoric 0001. 1462-1474 [doi]
- TOGLL: Correct and Strong Test Oracle Generation with LLMSSoneya Binta Hossain, Matthew B. Dwyer. 1475-1487 [doi]
- Answering User Questions About Machine Learning Models Through Standardized Model CardsTajkia Rahman Toma, Balreet Grewal, Cor-Paul Bezemer. 1488-1500 [doi]
- Fairness Testing Through Extreme Value TheoryVerya Monjezi, Ashutosh Trivedi 0001, Vladik Kreinovich, Saeid Tizpaz Niari. 1501-1513 [doi]
- Fixing Large Language Models' Specification Misunderstanding for Better Code GenerationZhao Tian, Junjie Chen, Xiangyu Zhang. 1514-1526 [doi]
- SOEN-101: Code Generation by Emulating Software Process Models Using Large Language Model AgentsFeng Lin, Dong Jae Kim, Tse-Hsun Chen. 1527-1539 [doi]
- The Product Beyond the Model - An Empirical Study of Repositories of Open-Source ML ProductsNadia Nahar, Haoran Zhang, Grace A. Lewis, Shurui Zhou, Christian Kästner. 1540-1552 [doi]
- Increasing the Effectiveness of Automatically Generated Tests by Improving Class ObservabilityGeraldine Galindo-Gutierrez, Juan Pablo Sandoval Alcocer, Nicolas Jimenez-Fuentes, Alexandre Bergel, Gordon Fraser 0001. 1553-1565 [doi]
- Invivo Fuzzing by Amplifying Actual ExecutionsOctavio Galland, Marcel Böhme. 1566-1578 [doi]
- Towards High-Strength Combinatorial Interaction Testing for Highly Configurable Software SystemsChuan Luo 0002, Shuangyu Lyu, Wei Wu 0011, Hongyu Zhang 0002, Dianhui Chu, Chunming Hu. 1579-1591 [doi]
- WDD: Weighted Delta DebuggingXintong Zhou, ZhenYang Xu, Mengxiao Zhang, Yongqiang Tian 0001, Chengnian Sun. 1592-1603 [doi]
- Topseed: Learning Seed Selection Strategies for Symbolic Execution from ScratchJaehyeok Lee, Sooyoung Cha. 1604-1615 [doi]
- The Seeds of the Future Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning LibrariesZhiyuan Li, JingZheng Wu, Xiang Ling 0001, Tianyue Luo, Zhiqing Rui, Yanjun Wu. 1616-1627 [doi]
- Between Lines of Code: Unraveling the Distinct Patterns of Machine and Human ProgrammersYuling Shi, Hongyu Zhang 0002, Chengcheng Wan 0001, Xiaodong Gu 0002. 1628-1639 [doi]
- Deep Learning-based Code Reviews: A Paradigm Shift or a Double-Edged Sword?Rosalia Tufano, Alberto Martin-Lopez, Ahmad Tayeb, Ozren Dabic, Sonia Haiduc, Gabriele Bavota. 1640-1652 [doi]
- An Exploratory Study of ML Sketches and Visual Code AssistantsLuís F. Gomes, Vincent J. Hellendoorn, Jonathan Aldrich, Rui Abreu 0001. 1653-1664 [doi]
- Licoeval: Evaluating LLMs on License Compliance in Code GenerationWeiwei Xu, Kai Gao, Hao He 0012, Minghui Zhou 0001. 1665-1677 [doi]
- Trust Dynamics in AI-Assisted Development: Definitions, Factors, and ImplicationsSadra Sabouri, Philipp Eibl, Xinyi Zhou, Morteza Ziyadi, Nenad Medvidovic, Lars Lindemann, Souti Chattopadhyay. 1678-1690 [doi]
- What Guides Our Choices? Modeling Developers' Trust and Behavioral Intentions Towards GenaiRudrajit Choudhuri, Bianca Trinkenreich, Rahul Pandita, Eirini Kalliamvakou, Igor Steinmacher, Marco Aurélio Gerosa, Christopher Sanchez, Anita Sarma. 1691-1703 [doi]
- Large Language Models as Configuration ValidatorsXinyu Lian, Yinfang Chen, Runxiang Cheng, Jie Huang 0009, Parth Thakkar, Minjia Zhang, Tianyin Xu. 1704-1716 [doi]
- LLM Assistance for Memory SafetyNausheen Mohammed, Akash Lal, Aseem Rastogi, Rahul Sharma 0001, Subhajit Roy 0001. 1717-1728 [doi]
- Vulnerability Detection with Code Language Models: How Far are We?Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David A. Wagner, Baishakhi Ray, Yizheng Chen 0001. 1729-1741 [doi]
- Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with JustificationsWei Ma, Daoyuan Wu, Yuqiang Sun 0001, Tianwen Wang, Shangqing Liu, Jian Zhang, Yue Xue, Yang Liu 0003. 1742-1754 [doi]
- Towards Neural Synthesis for SMT-Assisted Proof-Oriented ProgrammingSaikat Chakraborty, Gabriel Ebner, Siddharth Bhat, Sarah Fakhoury, Sakina Fatima, Shuvendu K. Lahiri, Nikhil Swamy. 1755-1767 [doi]
- Prompt-to-SQL Injections in LLM-Integrated Web Applications: Risks and DefensesRodrigo Pedro, Miguel E. Coimbra, Daniel Castro 0004, Paulo Carreira 0001, Nuno Santos 0001. 1768-1780 [doi]
- Boosting Path-Sensitive Value Flow Analysis Via Removal of Redundant SummariesYongchao Wang, Yuandao Cai, Charles Zhang 0001. 1781-1792 [doi]
- Dockerfile Flakiness: Characterization and RepairTaha Shabani, Noor Nashid, Parsa Alian, Ali Mesbah 0001. 1793-1805 [doi]
- Evaluating Garbage Collection Performance Across Managed Language RuntimesYicheng Wang, Wensheng Dou, Yu Liang, Yi Wang 0069, Wei Wang 0049, Jun Wei 0001, Tao Huang 0001. 1806-1818 [doi]
- Module-Aware Context Sensitive Pointer AnalysisHaofeng Li, Chenghang Shi, Jie Lu, Lian Li 0002, Zixuan Zhao. 1819-1831 [doi]
- Code Comment Inconsistency Detection and Rectification Using a Large Language ModelGuoping Rong, Yongda Yu, Song Liu, Xin Tan, Tianyi Zhang, Haifeng Shen, Jidong Hu. 1832-1843 [doi]
- Context Conquers Parameters: Outperforming Proprietary Llm in Commit Message GenerationAaron Imani, Iftekhar Ahmed 0001, Mohammad Moshirpour. 1844-1856 [doi]
- Hedgecode: A Multi-Task Hedging Contrastive Learning Framework for Code SearchGong Chen, Xiaoyuan Xie, Daniel Tang, Qi Xin, Wenjie Liu. 1857-1868 [doi]
- Reasoning Runtime Behavior of a Program with LLM: How Far are We?JunKai Chen, Zhiyuan Pan, Xing Hu 0008, Zhenhao Li 0002, Ge Li 0001, Xin Xia 0001. 1869-1881 [doi]
- Source Code Summarization in the Era of Large Language ModelsWeisong Sun, Yun Miao, Yuekang Li, Hongyu Zhang, Chunrong Fang, Yi Liu, Gelei Deng, Yang Liu, Zhenyu Chen. 1882-1894 [doi]
- Template-Guided Program Repair in the Era of Large Language ModelsKai Huang, Jian Zhang, Xiangxin Meng, Yang Liu. 1895-1907 [doi]
- Dissecting Global Search: A Simple Yet Effective Method to Boost Individual Discrimination Testing and RepairLili Quan, Tianlin Li, Xiaofei Xie, Zhenpeng Chen, Sen Chen, Lingxiao Jiang, Xiaohong Li. 1908-1920 [doi]
- FIXDRIVE: Automatically Repairing Autonomous Vehicle Driving Behaviour for $0.08 per ViolationYang Sun, Christopher M. Poskitt, Kun Wang, Jun Sun. 1921-1933 [doi]
- MARQ: Engineering Mission-Critical AI-Based Software with Automated Result Quality AdaptationUwe Gropengießer, Elias Dietz, Florian Brandherm, Achref Doula, Osama Abboud, Xun Xiao, Max Mühlhäuser. 1934-1946 [doi]
- Automated Test Generation For Smart Contracts via On-Chain Test Case Augmentation and MigrationJiashuo Zhang, Jiachi Chen, John Grundy, Jianbo Gao, Yanlin Wang, Ting Chen, Zhi Guan, Zhong Chen. 1947-1959 [doi]
- Boosting Code-line-level Defect Prediction with Spectrum Information and Causality AnalysisShiYu Sun, Yanhui Li, Lin Chen, Yuming Zhou, Jianhua Zhao. 1960-1972 [doi]
- DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path PlannersYue Wang, Chao Yang, Xiaodong Zhang, Yuwanqi Deng, Jianfeng Ma. 1973-1985 [doi]
- IRFuzzer: Specialized Fuzzing for LLVM Backend Code GenerationYuyang Rong, Zhanghan Yu, Zhenkai Weng, Stephen Neuendorffer, Hao Chen. 1986-1998 [doi]
- Ranking Relevant Tests for Order-Dependent Flaky TestsShanto Rahman, Bala Naren Chanumolu, Suzzana Rafi, August Shi, Wing Lam. 1999-2011 [doi]
- Selecting Initial Seeds for Better JVM FuzzingTianchang Gao, Junjie Chen, Dong Wang, Yile Guo, Yingquan Zhao, Zan Wang. 2012-2023 [doi]
- Toward a Better Understanding of Probabilistic Delta DebuggingMengxiao Zhang, ZhenYang Xu, Yongqiang Tian, Xinru Cheng, Chengnian Sun. 2024-2035 [doi]
- Tumbling Down the Rabbit Hole: How do Assisting Exploration Strategies Facilitate Grey-Box Fuzzing?Mingyuan Wu, Jiahong Xiang, Kunqiu Chen, Peng Di, Shin Hwei Tan, Heming Cui, Yuqun Zhang. 2036-2048 [doi]
- Relationship Status: "It's Complicated" Developer-Security Expert Dynamics in ScrumHouda Naji, Marco Gutfleisch, Alena Naiakshina. 2049-2061 [doi]
- Measuring the Runtime Performance of C++ Code Written by Humans Using Github CopilotDaniel Erhabor, Sreeharsha Udayashankar, Meiyappan Nagappan, Samer Al-Kiswany. 2062-2074 [doi]
- A Study of Undefined Behavior Across Foreign Function Boundaries in Rust LibrariesIan McCormack, Joshua Sunshine, Jonathan Aldrich. 2075-2086 [doi]
- Cooperative Software Verification via Dynamic Program SplittingCedric Richter, Marek Chalupa, Marie-Christine Jakobs, Heike Wehrheim. 2087-2099 [doi]
- Exposing the Hidden Layer: Software Repositories in the Service of Seo ManipulationMengying Wu, Geng Hong, Wuyuao Mai, Xinyi Wu, Lei Zhang, Yingyuan Pu, Huajun Chai, Lingyun Ying, Haixin Duan, Min Yang. 2100-2112 [doi]
- Hetrify: Efficient Verification of Heterogeneous Programs on RISC-VYiwei Li, Liangze Yin, Wei Dong, Jiaxin Liu, Yanfeng Hu, Shanshan Li. 2113-2124 [doi]
- Hyperion: Unveiling DApp Inconsistencies Using LLM and Dataflow-Guided Symbolic ExecutionShuo Yangt, Xingwei Lin, Jiachi Chen, Qingyuan Zhong, Lei Xiao, Renke Huang, Yanlin Wang, Zibin Zheng. 2125-2137 [doi]
- Smartreco: Detecting Read-Only Reentrancy via Fine-Grained Cross-DApp AnalysisJingwen Zhang, Zibin Zheng, Yuhong Nan, Mingxi Ye, Kaiwen Ning, Yu Zhang, Weizhe Zhang. 2138-2150 [doi]
- A Catalog of Micro Frontends Anti-PatternsNabson Paiva Souza da Silva, Eriky Rodrigues, Tayana Conte. 2151-2162 [doi]
- PairSmell: A Novel Perspective Inspecting Software Modular StructureChenxing Zhong, Daniel Feitosa, Paris Avgeriou, Huang Huang, Yue Li, He Zhang. 2163-2175 [doi]
- Understanding Architectural Complexity, Maintenance Burden, and Developer Sentiment -A Large-Scale StudyYuanfang Cai, Lanting He, Jun Qian, Yony Kochinski, Nan Zhang, Ciera Jaspan, Antonio Bianco. 2176-2187 [doi]
- RepairAgent: An Autonomous, LLM-Based Agent for Program RepairIslem Bouzenia, Premkumar Devanbu, Michael Pradel. 2188-2200 [doi]
- A Tale of Two DL Cities: When Library Tests Meet CompilerQingchao Shen, Yongqiang Tian, Haoyang Ma, Junjie Chen, Lili Huang, Ruifeng Fu, Shing-Chi Cheung, Zan Wang. 2201-2212 [doi]
- Iterative Generation of Adversarial Example for Deep Code ModelsLi Huang, Weifeng Sun, Meng Yan. 2213-2224 [doi]
- On the Mistaken Assumption of Interchangeable Deep Reinforcement Learning ImplementationsRajdeep Singh Hundal, Yan Xiao, Xiaochun Cao, Jin Song Dong, Manuel Rigger. 2225-2237 [doi]
- $\mu \text{PRL}$: A Mutation Testing Pipeline for Deep Reinforcement Learning Based on Real FaultsDeepak-George Thomas, Matteo Biagiola, Nargiz Humbatova, Mohammad Wardat, Gunel Jahangirova, Hridesh Rajan, Paolo Tonella. 2238-2250 [doi]
- Testing and Understanding Deviation Behaviors in FHE-Hardened Machine Learning ModelsYiteng Peng, Daoyuan Wu, Zhibo Liu, Dongwei Xiao, Zhenlan Ji, Juergen Rahmel, Shuai Wang. 2251-2263 [doi]
- TraceFL: Interpretability-Driven Debugging in Federated Learning via Neuron ProvenanceWaris Gill, Ali Anwar, Muhammad Ali Gulzar. 2264-2276 [doi]
- A First Look at Conventional Commits ClassificationQunhong Zeng, Yuxia Zhang, Zhiqing Qiu, Hui Liu. 2277-2289 [doi]
- Chatgpt Inaccuracy Mitigation During Technical Report Understanding: Are we There Yet?Salma Begum Tamanna, Gias Uddin, Song Wang, Lan Xia, Longyu Zhang. 2290-2302 [doi]
- SECRET: Towards Scalable and Efficient Code Retrieval via Segmented Deep HashingWenchao Gu, Ensheng Shi, Yanlin Wang, Lun Du, Shi Han, Hongyu Zhang, Dongmei Zhang, Michael R. Lyu. 2303-2315 [doi]
- Decoding the Issue Resolution Process in Practice via Issue Report Analysis: a Case Study of FirefoxAntu Saha, Oscar Chaparro. 2316-2328 [doi]
- Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and EnhancementsHuaijin Wang, Zhibo Liu, Yanbo Dai, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu. 2329-2341 [doi]
- UML is Back. Or is it? Investigating the Past, Present, and Future of UML in Open Source SoftwareJoseph Romeo, Marco Raglianti, Csaba Nagy, Michele Lanza. 2342-2354 [doi]
- Understanding the Response to Open-Source Dependency Abandonment in the npm EcosystemCourtney Miller, Mahmoud Jahanshahi, Audris Mockus, Bogdan Vasilescu, Christian Kastner. 2355-2367 [doi]
- Understanding Compiler Bugs in Real DevelopmentHao Zhong. 2368-2379 [doi]
- Studying Programmers Without Programming: Investigating Expertise Using Resting State fMRIZachary Karas, Benjamin Gold, Violet Zhou, Noah Reardon, Thad Polk, Catie Chang, Yu Huang. 2380-2392 [doi]
- Accessibility Issues in Ad-Driven Web ApplicationsAbdul Haddi Amjad, Muhammad Danish, Bless Jah, Muhammad Ali Gulzar. 2393-2405 [doi]
- Unveiling the Energy Vampires: A Methodology for Debugging Software Energy ConsumptionEnrique Barba Roque, Luis Cruz, Thomas Durieux. 2406-2418 [doi]
- Automated, Unsupervised, and Auto-Parameterized Inference of Data Patterns and Anomaly DetectionQiaolin Qin, Heng Li, Ettore Merlo, Maxime Lamothe. 2419-2431 [doi]
- On Prescription or Off Prescription? An Empirical Study of Community-Prescribed Security Configurations for KubernetesShazibul Islam Shamim, Hanyang Hu, Akond Rahman. 2432-2444 [doi]
- Similar but Patched Code Considered Harmful: The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove ThemZixuan Tan, Jiayuan Zhou, Xing Hu, Shengyi Pan, Kui Liu, Xin Xia. 2445-2457 [doi]
- Tiver: Identifying Adaptive Versions of C/C++ Third-Party Open-Source Components Using a Code Clustering TechniqueYoungjae Choi, Seunghoon Woo. 2458-2469 [doi]
- An Exploratory Study on the Engineering of Security FeaturesKevin Hermann, Sven Peldszus, Jan-Philipp Steghöfer, Thorsten Berger. 2470-2482 [doi]
- DesignRepair: Dual-Stream Design Guideline-Aware Frontend Repair with Large Language ModelsMingyue Yuan, Jieshan Chen, Zhenchang Xing, Aaron Quigley, Yuyu Luo, Tianqi Luo, Gelareh Mohammadi, Qinghua Lu, Liming Zhu. 2483-2494 [doi]
- Fidelity of Cloud Emulators: The Imitation Game of Testing Cloud-Based SoftwareAnna Mazhar, Saad Sher Alam, William X. Zheng, Yinfang Chen, Suman Nath, Tianyin Xu. 2495-2507 [doi]
- Formally Verified Cloud-Scale AuthorizationAleks Chakarov, Jaco Geldenhuys, Matthew Heck, Michael Hicks, Sam Huang, Georges-Axel Jaloyan, Anjali Joshi, K. Rustan M. Leino, Mikael Mayer, Sean McLaughlin, Akhilesh Mritunjai, Clement Pit-Claudel, Sorawee Porncharoenwase, Florian Rabe, Marianna Rapoport, Giles Reger, Cody Roux, Neha Rungta, Robin Salkeld, Matthias Schlaipfer, Daniel Schoepe, Johanna Schwartzentruber, Serdar Tasiran, Aaron Tomb, Emina Torlak, Jean-Baptiste Tristan, Lucas Wagner, Michael W. Whalen, Remy Willems, Tongtong Xiang, Tae Joon Byun, Joshua Cohen, Ruijie Fang, Junyoung Jang, Jakob Rath, Hira Taqdees Syeda, Dominik Wagner, Yongwei Yuan. 2508-2521 [doi]
- The Same Only Different: On Information Modality for Configuration Performance AnalysisHongyuan Liang, Yue Huang, Tao Chen. 2522-2534 [doi]
- 3DGen: AI-Assisted Generation of Provably Correct Binary Format ParsersSarah Fakhoury, Markus Kuppe, Shuvendu K. Lahiri, Tahina Ramananandro, Nikhil Swamy. 2535-2547 [doi]
- Aligning the Objective of LLM-Based Program RepairJunjielong Xu, Ying Fu, Shin Hwei Tan, Pinjia He. 2548-2560 [doi]
- Revisiting Unnaturalness for Automated Program Repair in the Era of Large Language ModelsAidan Z. H. Yang, Sophia Kolak, Vincent Hellendoorn, Ruben Martins, Claire Le Goues. 2561-2573 [doi]
- The Fact Selection Problem in LLM-Based Program RepairNikhil Parasaram, Huijie Yan, Boyu Yang, Zineb Flahy, Abriele Qudsi, Damian Ziaber, Earl T. Barr, Sergey Mechtaev. 2574-2586 [doi]
- Towards Understanding the Characteristics of Code Generation Errors Made by Large Language ModelsZhijie Wang, Zijie Zhou, Da Song, Yuheng Huang, Shengmai Chen, Lei Ma, Tianyi Zhang. 2587-2599 [doi]
- Famos: Fault Diagnosis for Microservice Systems Through Effective Multi-Modal Data FusionChiming Duan, Yong Yang, Tong Jia, Guiyang Liu, Jinbu Liu, Huxing Zhang, Qi Zhou, Ying Li, Gang Huang. 2613-2624 [doi]
- Leveraging Large Language Models to Detect NPM Malicious PackagesNusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie Williams. 2625-2637 [doi]
- MAGIKA: AI-Powered Content-Type DetectionYanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein. 2638-2649 [doi]
- Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code NaturalnessWeisong Sun, Yuchen Chen, Mengzhe Yuan, Chunrong Fang, Zhenpeng Chen, Chong Wang 0013, Yang Liu 0003, Baowen Xu, Zhenyu Chen 0001. 2663-2675 [doi]
- Treefix: Enabling Execution with a Tree of PrefixesBeatriz Souza, Michael Pradel. 2676-2688 [doi]
- Automated Accessibility Analysis of Dynamic Content Changes on Mobile AppsForough Mehralian, Ziyao He, Sam Malek. 2689-2701 [doi]
- Janus: Detecting Rendering Bugs in Web Browsers via Visual Delta ConsistencyChijin Zhou, Quan Zhang, Bingzhou Qian, Yu Jiang 0001. 2702-2713 [doi]
- Chatgpt-Based Test Generation for Refactoring Engines Enhanced by Feature Analysis on ExamplesChunhao Dong, Yanjie Jiang, Yuxia Zhang, Yang Zhang, Hui Liu. 2714-2725 [doi]
- Navigating the Testing of Evolving Deep Learning Systems: An Exploratory Interview StudyHanmo You, Zan Wang, Bin Lin, Junjie Chen. 2726-2738 [doi]
- EP-Detector: Automatic Detection of Error-Prone Operation Anomalies in Android ApplicationsChenkai Guo, Qianlu Wang, Naipeng Dong, Lingling Fan 0003, Tianhong Wang 0010, Weijie Zhang, Enbao Chen, Zheli Liu, Lu Yu. 2739-2750 [doi]
- Mobile Application Coverage: The 30% Curse and Ways ForwardFaridah Akinotcho, Lili Wei, Julia Rubin. 2751-2763 [doi]
- The Design Smells Breaking the Boundary between Android Variants and AOSPWuxia Jin, Jiaowei Shang, Jianguo Zheng, Mengjie Sun, Zhenyu Huang, Ming Fan 0002, Ting Liu 0002. 2764-2776 [doi]
- Scenario-Driven and Context-Aware Automated Accessibility Testing for Android AppsYuxin Zhang, Sen Chen 0001, Xiaofei Xie, Zibo Liu, Lingling Fan 0003. 2777-2789 [doi]
- TacDroid: Detection of Illicit Apps Through Hybrid Analysis of UI-Based Transition GraphsYanchen Lu, Hongyu Lin, Zehua He, Haitao Xu, Zhao Li, Shuai Hao, Liu Wang, Haoyu Wang, Kui Ren. 2790-2802 [doi]
- PacDroid: A Pointer-Analysis-Centric Framework for Security Vulnerabilities in Android AppsMenglong Chen, Tian Tan, Minxue Pan, Yue Li. 2803-2815 [doi]
- ROSA: Finding Backdoors with FuzzingDimitri Kokkonis, Michaël Marcozzi, Emilien Decoux, Stefano Zacchiroli. 2816-2828 [doi]
- Analyzing the Feasibility of Adopting Google's Nonce-Based CSP Solutions on WebsitesMengxia Ren, Anhao Xiang, Chuan Yue. 2829-2840 [doi]
- Early Detection of Performance Regressions by Bridging Local Performance Data and Architectural ModelsLizhi Liao, Simon Eismann, Heng Li 0007, Cor-Paul Bezemer, Diego Elias Costa, André van Hoorn, Weiyi Shang. 2841-2853 [doi]
- Practical Object-Level Sanitizer with Aggregated Memory Access and Custom AllocatorXiaolei Wang, Ruilin Li, Bin Zhang, Chao Feng, Chaojing Tang. 2854-2866 [doi]
- GVI: Guided Vulnerability Imagination for Boosting Deep Vulnerability DetectorsHeng Yong, Zhong Li, Minxue Pan, Tian Zhang, Jianhua Zhao, Xuandong Li. 2867-2879 [doi]
- Decoding Secret Memorization in Code LLMs Through Token-Level CharacterizationYuqing Nie, Chong Wang, Kailong Wang 0001, Guoai Xu, Guosheng Xu 0001, Haoyu Wang 0001. 2880-2892 [doi]
- Are We Learning the Right Features? A Framework for Evaluating DL-Based Software Vulnerability Detection SolutionsSatyaki Das, Syeda Tasnim Fabiha, Saad Shafiq, Nenad Medvidovic. 2893-2904 [doi]
- Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention InferenceChong Wang, Jianan Liu, Xin Peng, Yang Liu, Yiling Lou. 2905-2917 [doi]
- Weakly-Supervised Log-Based Anomaly Detection with Inexact Labels via Multi-Instance LearningMinghua He, Tong Jia, Chiming Duan, Huaqian Cai, Ying Li 0012, Gang Huang 0001. 2918-2930 [doi]
- When Quantum Meets Classical: Characterizing Hybrid Quantum-Classical Issues Discussed in Developer ForumsJake Zappin, Trevor Stalnaker, Oscar Chaparro, Denys Poshyvanyk. 2931-2943 [doi]
- Improved Detection and Diagnosis of Faults in Deep Neural Networks Using Hierarchical and Explainable ClassificationSigma Jahan, Mehil B. Shah, Parvez Mahbub, Mohammad Masudur Rahman 0001. 2944-2956 [doi]
- Lightweight Concolic Testing via Path-Condition Synthesis for Deep Learning LibrariesSehoon Kim, Yonghyeon Kim, Dahyeon Park, Yuseok Jeon, Jooyong Yi, Mijung Kim. 2957-2969 [doi]
- Mock Deep Testing: Toward Separate Development of Data and Models for Deep LearningRuchira Manke, Mohammad Wardat, Foutse Khomh, Hridesh Rajan. 2970-2982 [doi]
- Rug: Turbo Llm for Rust Unit Test GenerationXiang Cheng, Fan Sang, Yizhuo Zhai, Xiaokuan Zhang, Taesoo Kim. 2983-2995 [doi]
- An Empirical Study of Proxy Contracts at the Ethereum Ecosystem ScaleMengya Zhang, Preksha Shukla, Wuqi Zhang, Zhuo Zhang 0002, Pranav Agrawal 0002, Zhiqiang Lin 0001, Xiangyu Zhang 0001, Xiaokuan Zhang. 2996-3008 [doi]
- Demystifying and Detecting Cryptographic Defects in Ethereum Smart ContractsJiashuo Zhang, Yiming Shen, Jiachi Chen, Jianzhong Su, Yanlin Wang 0001, Ting Chen 0002, Jianbo Gao, Zhong Chen 0001. 3009-3021 [doi]
- Chord: Towards a Unified Detection of Blockchain Transaction Parallelism BugsYuanhang Zhou, Zhen Yan, Yuanliang Chen, Fuchen Ma, Ting Chen, Yu Jiang. 3022-3034 [doi]
- Definition and Detection of Centralization Defects in Smart ContractsZewei Lin, Jiachi Chen, Jiajing Wu, Weizhe Zhang, Zibin Zheng. 3035-3047 [doi]
- Fork State-Aware Differential Fuzzing for Blockchain Consensus ImplementationsWonhoi Kim, HoCheol Nam, Muoi Tran, Amin Jalilov, Zhenkai Liang, Sang Kil Cha, Min-Suk Kang. 3048-3059 [doi]
- Code Cloning in Solidity Smart Contracts: Prevalence, Evolution, and Impact on DevelopmentRan Mo, Haopeng Song, Wei Ding, Chaochao Wu. 3060-3071 [doi]
- Pattern-Based Generation and Adaptation of Quantum WorkflowsMartin Beisel, Johanna Barzen, Frank Leymann, Lavinia Stiliadou, Daniel Vietz, Benjamin Weder. 3072-3084 [doi]
- BSan: A Powerful Identifier-Based Hardware-Independent Memory Error Detector for COTS BinariesWen Zhang, Botang Xiao, Qingchen Kong, Le Guan, Wenwen Wang. 3085-3096 [doi]
- RustAssistant: Using LLMs to Fix Compilation Errors in Rust CodePantazis Deligiannis, Akash Lal, Nikita Mehrotra, Rishi Poddar, Aseem Rastogi. 3097-3109 [doi]
- Your Fix Is My Exploit: Enabling Comprehensive DL Library API Fuzzing with Large Language ModelsKunpeng Zhang, Shuai Wang, Jitao Han, Xiaogang Zhu, Xian Li, Shaohua Wang, Sheng Wen. 3110-3122 [doi]
- BDefects4NN: A Backdoor Defect Database for Controlled Localization Studies in Neural NetworksYisong Xiao, Aishan Liu, Xinwei Zhang, Tianyuan Zhang 0004, Tianlin Li, Siyuan Liang, Xianglong Liu 0001, Yang Liu, Dacheng Tao. 3123-3135 [doi]
- Leveraging Propagated Infection to Crossfire MutantsHang Du, Vijay Krishna Palepu, James A. Jones. 3136-3148 [doi]