Abstract is missing.
- Towards understanding the security issues of Python programsHongcheng Fan, Di Liu 0021, Jielun Wu, Yang Feng 0003, Qingkai Shi, Baowen Xu. 1-12 [doi]
- A Novel LLM Approach of Cybersecurity Threat Analysis and ResponseTian Hu, Shangyuan Zhuang, Zhaorui Guo, Jiyan Sun, YinLong Liu, Wei Ma, Hongchao Wang, Lingfeng Zhao, Xiaojie Zhang. 13-23 [doi]
- Measuring and Explaining the Effects of Android App Transformations in Online Malware DetectionGuozhu Meng, Zhixiu Guo, Xiaodong Zhang, Haoyu Wang, Kai Chen, Yang Liu. 24-35 [doi]
- Leveraging Visible Widget Sizes for Detecting Repackaged Android AppsJun Ma 0010, Weixiang Huang, Chun Cao. 36-46 [doi]
- Code Retrieval with Mixture of Experts Prototype Learning Based on ClassificationFeng Ling, Guoheng Huang, Jingchao Wang, Xiaochen Yuan, Xuhang Chen 0002, Xueyong Zhang, Fanlong Zhang, Chi-Man Pun. 47-58 [doi]
- Issue Retrieval and Verification Enhanced Supplementary Code Comment GenerationYanzhen Zou, Xianlin Zhao, Xinglu Pan, Bing Xie. 59-70 [doi]
- CodeCleaner: Mitigating Data Contamination for LLM BenchmarkingJialun Cao, Songqiang Chen, Wuqi Zhang, Hau Ching Lo, Yeting Li, Shing-Chi Cheung. 71-83 [doi]
- LASER: Script Execution by Autonomous Agents for On-demand Traffic SimulationHao Gao, Jingyue Wang, Wenyang Fang, Jingwei Xu 0001, Yunpeng Huang, Taolue Chen 0001, Xiaoxing Ma. 84-95 [doi]
- Tech-ASan: Two-stage check for Address SanitizerYixuan Cao 0002, Yuhong Feng, Huafeng Li, Chongyi Huang, Fangcao Jian, Haoran Li, Xu Wang 0006. 96-107 [doi]
- SRLRF: Fine-Grained Root Cause Analysis and Prediction for Compiler Optimization DefectsHan Luo, Yixuan Tang, Jingxuan Zhang, Xuanyan Zhu, Jiayi Li, Weiqin Zou. 108-118 [doi]
- Revisit the Intuition of Mutation-Based Fault Localization in Real-world ProgramsChenliang Xing, Gong Chen 0007, Qi Xin, Xiaoyuan Xie. 119-129 [doi]
- Emerging Compiler Testing Based on Test Case ReuseKelin Zhu, Yu Wang 0093, Linzhang Wang, Xuandong Li. 130-141 [doi]
- UITrans: Seamless UI Translation from Android to HarmonyOSLina Gong, Chen Wang, Di Cui, Yujun Huang, Mingqiang Wei. 142-146 [doi]
- XR4PD: Augmented Reality for Visualising Problem Diagrams in Requirements AnalysisYang Hua, Hongbin Xiao, Wenhao Wang, Zhi Li 0017. 147-151 [doi]
- Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep Neural NetworksJingling Wang, Shuwei Qiu, Peng Wang 0125, Jiyuan Song, Huayao Wu, Xintao Niu, Changhai Nie. 152-162 [doi]
- Take Kernel Stack Overhead Out: eBPF-Enhanced Network Acceleration for Distributed Training within EthernetZhenyu Zhang, Pengfei Chen 0002, Guangba Yu, Zilong He, Xiaoyun Li. 163-174 [doi]
- Exploiting Booster Pass Chain for Compiler Phase OrderingYihan Chen 0008, Huanhuan Chen 0005, Yuan Yao 0001, Ping Yu 0004, Feng Xu 0007, Xiaoxing Ma. 175-185 [doi]
- DeFS: A Decentralized and High-Performance File System for Consortium SystemsYitong Cheng, Shenglong Zhao, Yang Yu, Zhichao Hua 0001. 186-197 [doi]
- Proteus: An Automatical High-Efficiency Framework for Generating Compact and Printable Shellcode on ARMv8Jian Lin 0007, Guoan Liu, Rui Chang, Ruimin Wang. 198-208 [doi]
- Modeling Go Concurrency: A Static Analysis Approach to Data Race DetectionFengjuan Gao, Mumu Zhang, Zixiao Zhao, Yu Wang 0093, Xuandong Li. 209-219 [doi]
- RABBIT: Managing Hierarchical Memory with Intelligent Tiering Aware DeduplicationZilu Yao, Yinjin Fu, Nong Xiao 0001. 220-232 [doi]
- DPCapsule: A Decentralized Private Computing System With Self-Controlled DataYitong Cheng, Yang Yu, Zhichao Hua 0001. 233-244 [doi]
- MicroGuard: Non-Intrusive Dynamic Analysis for Inter-Service Access Control of MicroservicesHaoming Luo, Wanqi Yang, Pengfei Chen 0002. 245-257 [doi]
- Devmp: A Virtual Instruction Extraction Method for Commercial Code Virtualization ObfuscatorsShenqianqian Zhang, Weiyu Dong, Jian Lin 0007. 258-268 [doi]
- Line-level Semantic Structure Learning for Code Vulnerability DetectionZiliang Wang, Ge Li 0001, Jia Li 0011, Yihong Dong, Yingfei Xiong 0001, Zhi Jin 0001. 269-280 [doi]
- SLVHound: Static Detection of Session Lingering Vulnerabilities in Modern Java Web ApplicationsHaining Meng, Jie Lu, Yongheng Huang, Lian Li 0002. 281-292 [doi]
- Def-VAE: Identifying Adversarial Inputs with Robust Latent RepresentationsChengye Li, Changshun Wu, Rongjie Yan. 293-304 [doi]
- Fuzzing for Stateful Protocol Programs Based on Constraints between States and Message TypesKunpeng Jian, Yanyan Zou 0002, Menghao Li, Wei Huo. 305-316 [doi]
- Detecting State Manipulation Vulnerabilities in Smart Contracts Using LLM and Static AnalysisHao Wu, Haijun Wang 0002, Shangwang Li, Yin Wu, Ming Fan 0002, Yitao Zhao, Ting Liu 0002. 317-320 [doi]
- Beyond Isolated Changes: A Context-aware and Dependency-enhanced Code Change Detection MethodBinghe Wang, Wuxia Jin, Zijun Wang, Mengjie Sun, Haijun Wang 0002. 321-331 [doi]
- Orion: A Multi-Agent Framework for Optimizing RAG Systems through Specialized Agent CollaborationXianxing Fang, Liangru Xie, Weibin Yang, Tianyi Zhang, RuiTao Zhang, Hao Wang 0003, Di Wu 0035, Yushan Pan. 332-343 [doi]
- GPT Store Mining and AnalysisDongxun Su, Yanjie Zhao, Xinyi Hou, Shenao Wang 0001, Haoyu Wang 0001. 344-354 [doi]
- Mining Discriminative Issue Resolution Temporal Sequential Patterns in Open Source Software RepositoriesYaxin Wang, Liang Wang, Hao Hu, XianPing Tao. 355-365 [doi]
- Generating SysML Behavior Models via Large Language Models: an Empirical StudyYuan Wang, Ning Ge 0002, Jiangxi Liu, Zhilong Cao, Zheping Chen, Chunming Hu. 366-377 [doi]
- FIRE: Smart Contract Bytecode Function Identification via Graph-Refined Hybrid Feature EncodingYu Sun, Lingfeng Bao, Xiaohu Yang 0001. 378-388 [doi]
- Brevity is the Soul of Wit: Condensing Code Changes to Improve Commit Message GenerationHongyu Kuang, Ning Zhang, Hui Gao, Xin Zhou 0016, Wesley K. G. Assunção, Xiaoxing Ma, Dong Shao, Guoping Rong, He Zhang 0001. 389-401 [doi]
- DesDD: A Design-Enabled Framework with Dual-Layer Debugging for LLM-based Iterative API OrchestratingZhuo Cheng, Zhou Zou, Qing Huang, Zhenchang Xing, Wei Zhang, Shaochen Wang, Xueting Yi, Huan Jin, Zhiping Liu, Zhaojin Lu. 402-412 [doi]
- AUCAD: Automated Construction of Alignment Dataset from Log-Related Issues for Enhancing LLM-based Log GenerationHao Zhang, Dongjun Yu, Lei Zhang, Guoping Rong, Yongda Yu, Haifeng Shen, He Zhang, Dong Shao, Hongyu Kuang. 413-425 [doi]
- Enhancement Report Approval Prediction: A Comparative Study of Large Language ModelsHaosheng Zuo, Feifei Niu, Chuanyi Li. 426-436 [doi]
- MetaCoder: Generating Code from Multiple PerspectivesXin Chen, Zhijie Jiang, Yong Guo, Zhouyang Jia, Si Zheng 0003, Yuanliang Zhang, Shanshan Li 0001. 437-448 [doi]
- API-Repo: API-centric Repository-level Code CompletionZhihao Li, Chuanyi Li, Changan Niu, Ying Yan, JiDong Ge, Bin Luo. 449-460 [doi]
- AdaptiveLLM: A Framework for Selecting Optimal Cost-Efficient LLM for Code-Generation Based on CoT LengthJunhang Cheng, Fang Liu, Chengru Wu, Li Zhang. 461-473 [doi]
- Lightweight Probabilistic Coverage Metrics for Efficient Testing of Deep Neural NetworksYining Yin, Yang Feng 0003, Shihao Weng, Xinyu Gao, Jia Liu 0015, Zhihong Zhao. 474-486 [doi]
- VDLS: A Vulnerability Detection Approach Based on Execution Path SelectionXuanyan Zhu, Jingxuan Zhang, Yixuan Tang, Weiqin Zou, Jiayi Li, Han Luo. 487-497 [doi]
- Exploring Typo Squatting Threats in the Hugging Face EcosystemNingyuan Li, Yanjie Zhao, Shenao Wang 0001, Zehao Wu, Haoyu Wang 0001. 498-509 [doi]
- Unraveling the Characterization and Propagation of Security Vulnerabilities in TensorFlow-based Deep Learning Software Supply ChainYiren Zhou, Lina Gong, Tiantian Ma. 510-521 [doi]
- Seeing is (Not) Believing: The Mirage Card Attack Targeting Online Social NetworksWangchenlu Huang, Shenao Wang 0001, Yanjie Zhao 0001, Tianxiang Wang, Yuhao Gao, Guosheng Xu 0001, Haoyu Wang. 522-532 [doi]
- ETrace : Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace AnalysisChenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan 0002, Yitao Zhao, Ting Liu 0002. 533-536 [doi]
- A Natural Language Guided Adaptive Model-based Testing Tool for Autonomous DrivingMan Zhang 0001, Peiru Li, Yize Shi, Tao Yue 0002. 537-540 [doi]
- Software Reuse in the Generative AI Era: From Cargo Cult Towards Systematic PracticesTommi Mikkonen, Antero Taivalsaari. 541-544 [doi]
- EnvGuard: Guaranteeing Environment-Centric Safety and Security Properties in Web of Things SystemBingkun Sun, Jialin Ren, Juntao Luo, Liwei Shen, Yongqiang Lu 0007, Qicai Chen, Zhen Dong, Xin Peng 0001. 545-557 [doi]
- Privacy-Preserving Authentication Scheme for V2G in social IoT Based on Certificateless Aggregate SignaturesZhuoqun Xia, Yutong Xie, Xin Wang. 558-567 [doi]
- To Split or to Merge? Exploring Multi-modal Data Flexibly for Failure Classification in MicroservicesXiuhong Tan, Yuan Yuan 0034, Tongqing Zhou, Shiming He, Yuqi Li, Jian Zhang. 568-577 [doi]
- Dynamic Microservice Resource Optimization Management Based on MAPE LoopLu Wang, Xu Fan, Yaxiao Li, Quanwei Du, Jialuo She, Qingshan Li. 578-588 [doi]
- Documenting Microservice Integration with MSAdocGeorg-Daniel Schwarz, Dirk Riehle. 589-592 [doi]