Abstract is missing.
- On the Vulnerabilities of Text-to-SQL ModelsXutan Peng, Yipeng Zhang, Jingfeng Yang, Mark Stevenson. 1-12 [doi]
- AutoKAD: Empowering KPI Anomaly Detection with Label-Free DeploymentZhaoyang Yu, Changhua Pei, Shenglin Zhang, Xidao Wen, Jianhui Li, Gaogang Xie, Dan Pei. 13-23 [doi]
- Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint AnalysisYang Chen, Jianfeng Jiang, Shoumeng Yan, Hui Xu. 24-35 [doi]
- Practical Anomaly Detection over Multivariate Monitoring Metrics for Online ServicesJinyang Liu, Tianyi Yang, Zhuangbin Chen, Yuxin Su 0001, Cong Feng, Zengyin Yang, Michael R. Lyu. 36-45 [doi]
- AFALog: A General Augmentation Framework for Log-based Anomaly Detection with Active LearningChiming Duan, Tong Jia, Huaqian Cai, Ying Li 0012, Gang Huang 0001. 46-56 [doi]
- An Empirical Analysis of Anomaly Detection Methods for Multivariate Time SeriesDongwen Li, Shenglin Zhang, Yongqian Sun, Yang Guo, Zeyu Che, Shiqi Chen, Zhenyu Zhong, Minghan Liang, Minyi Shao, Mingjie Li 0005, Shuyang Liu, Yuzhi Zhang, Dan Pei. 57-68 [doi]
- Efficient and Robust Trace Anomaly Detection for Large-Scale Microservice SystemsShenglin Zhang, Zhongjie Pan, Heng Liu, Pengxiang Jin, Yongqian Sun, Qianyu Ouyang, Jiaju Wang, Xueying Jia, Yuzhi Zhang, Hui Yang, Yongqiang Zou, Dan Pei. 69-79 [doi]
- A Survey on What Developers Think About TestingPhilipp Straubinger, Gordon Fraser 0001. 80-90 [doi]
- Towards the Implementation of a Mobile Application Testing Infrastructure at Von Braun LabsPedro Henrique Kuroishi, José Carlos Maldonado, Auri Marcelo Rizzo Vincenzi. 91-101 [doi]
- Mind the Gap: The Difference Between Coverage and Mutation Score Can Guide Testing EffortsKush Jain, Goutamkumar Tulajappa Kalburgi, Claire Le Goues, Alex Groce. 102-113 [doi]
- Do Mutations of Strongly Subsuming Second-Order Mutants Really Mask Each Other?João Paulo Diniz, Fischer Ferreira, Fabiano Cutigi Ferrari, Eduardo Figueiredo 0001. 114-124 [doi]
- Intrusion detection without attack knowledge: generating out-of-distribution tabular dataAndrea Ceccarelli, Tommaso Zoppi. 125-136 [doi]
- An Approach to Characterize the Security of Open-Source Functions using LSPJosé D'Abruzzo Pereira, Marco Vieira. 137-147 [doi]
- SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGXJiawei Huang, Hao Han, Fengyuan Xu, Bing Chen 0002. 148-159 [doi]
- Lark: Verified Cross-Domain Access Control for Trusted Execution EnvironmentsFanlang Zeng, Zhuoruo Zhang, Rui Chang, Chenyang Yu, Zijun Zhang, Yongwang Zhao. 160-171 [doi]
- DeepUserLog: Deep Anomaly Detection on User Log Using Semantic Analysis and Key-Value DataWenjing Wang, Shida Lu, Jianhui Luo, Chengrong Wu. 172-182 [doi]
- fKPISelect: Fault-Injection Based Automated KPI Selection for Practical Multivariate Anomaly DetectionXingjian Zhang, Yinqin Zhao, Chang Liu, Long Wang, Xin Yang, Yefei Hou, Zhongwen Lan, Xining Hu, Beibei Miao, Ming Yang, Xiangyi Jing, Sijie Li. 183-194 [doi]
- LogRep: Log-based Anomaly Detection by Representing both Semantic and Numeric Information in Raw MessagesXiaoda Xie, Songlei Jian, Chenlin Huang, Fengyuan Yu, Yunjia Deng. 194-206 [doi]
- Parameter-Efficient Log Anomaly Detection based on Pre-training model and LORAShiming He, Ying Lei, Ying Zhang, Kun Xie 0001, Pradip Kumar Sharma. 207-217 [doi]
- Crucible: Graphical Test Cases for Alloy ModelsAdam G. Emerson, Allison Sullivan. 218-227 [doi]
- Search-based Test Case Selection for PLC Systems using Functional Block Diagram ProgramsMiriam Ugarte Querejeta, Eunkyoung Jee, Lingjun Liu, Pablo Valle, Aitor Arrieta, Miren Illarramendi Rezabal. 228-239 [doi]
- Can Code Representation Boost IR-Based Test Case Prioritization?Lin Yang, Junjie Chen 0003, Hanmo You, Jiachen Han, Jiajun Jiang, Zhe Sun, Xinqi Lin, Fang Liang, Yuning Kang. 240-251 [doi]
- Contrastive Coincidental Correctness Representation LearningMaojin Li, Yan Lei, Huan Xie, Jiaguo Wang, Chunyan Liu, Zhengxiong Deng. 252-263 [doi]
- How to Manage Change-Induced Incidents? Lessons from the Study of Incident Life CycleYujin Zhao, Ling Jiang, Ye Tao, Songlin Zhang, Changlong Wu, Yifan Wu, Tong Jia, Ying Li 0012, Zhonghai Wu. 264-274 [doi]
- A Two-Stage Framework for Ambiguous Classification in Software EngineeringJiaying Li, Yan Lei, Shanshan Li 0001, Haifang Zhou, Yue Yu 0001, Zhouyang Jia, Yingwei Ma, Teng Wang 0004. 275-286 [doi]
- Identifying Root-Cause Changes for User-Reported Incidents in Online Service SystemsYujin Zhao, Ling Jiang, Ye Tao, Songlin Zhang, Changlong Wu, Tong Jia, Xiaosong Huang, Ying Li 0012, Zhonghai Wu. 287-297 [doi]
- CODEC: Cost-Effective Duration Prediction System for Deadline Scheduling in the CloudHaozhe Li, Minghua Ma, Yudong Liu, Si-qin, Bo Qiao 0001, Randolph Yao, Harshwardhan Chaturvedi, Tri Tran, Murali Chintalapati, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang 0001. 298-308 [doi]
- EvoScenario: Integrating Road Structures into Critical Scenario Generation for Autonomous Driving System TestingShuncheng Tang, Zhenya Zhang, Jixiang Zhou, Yuan Zhou, Yan-fu Li, Yinxing Xue. 309-320 [doi]
- From Collision to Verdict: Responsibility Attribution for Autonomous Driving Systems TestingJixiang Zhou, Shuncheng Tang, Yan Guo, Yan-fu Li, Yinxing Xue. 321-332 [doi]
- Characterizing Reliability of Three-version Traffic Sign Classifier System through Diversity MetricsQiang Wen, Fumio Machida. 333-343 [doi]
- Risk-driven Online Testing and Test Case Diversity Analysis for ML-enabled Critical SystemsJubril Gbolahan Adigun, Tom Philip Huck, Matteo Camilli, Michael Felderer. 344-354 [doi]
- Loghub: A Large Collection of System Log Datasets for AI-driven Log AnalyticsJieming Zhu, Shilin He, Pinjia He, Jinyang Liu, Michael R. Lyu. 355-366 [doi]
- Using Transformer Models and Textual Analysis for Log ParsingVithor G. F. Bertalan, Daniel Aloise. 367-378 [doi]
- Log Parsing Evaluation in the Era of Modern Software SystemsStefan Petrescu, Floris den Hengst, Alexandru Uta, Jan S. Rellermeyer. 379-390 [doi]
- EvLog: Identifying Anomalous Logs over Software EvolutionYintong Huo, Cheryl Lee, Yuxin Su 0001, Shiwen Shan, Jinyang Liu, Michael R. Lyu. 391-402 [doi]
- Effectively Finding ICC-related Bugs in Android Apps via Reinforcement LearningHui Guo, Ting Su 0001, Xiaoqiang Liu, Siyi Gu, Jingling Sun. 403-414 [doi]
- Demand-driven Information Flow Analysis of WebView in Android Hybrid AppsAbhishek Tiwari 0001, Jyoti Prakash, Christian Hammer 0001. 415-426 [doi]
- APIMind: API-driven Assessment of Runtime Description-to-permission Fidelity in Android AppsShaokun Zhang, Hanwen Lei, Yuanpeng Wang, Ding Li 0001, Yao Guo 0001, Xiangqun Chen. 427-438 [doi]
- ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence MatchingShaokun Zhang, Linna Wu, Yuanchun Li, Ziqi Zhang, Hanwen Lei, Ding Li 0001, Yao Guo 0001, Xiangqun Chen. 439-450 [doi]
- Online Failure Prediction Through Fault Injection and Machine Learning: Methodology and Case StudyJoão R. Campos, Ernesto Costa, Marco Vieira. 451-461 [doi]
- Evaluating and Enhancing the Robustness of Federated Learning System against Realistic Data CorruptionChen Yang, Yuanchun Li, Hao Lu, Jinliang Yuan, Qibo Sun, Shangguang Wang, Mengwei Xu. 462-473 [doi]
- Evaluating the Effect of Common Annotation Faults on Object Detection TechniquesAbraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. 474-485 [doi]
- ServerRCA: Root Cause Analysis for Server Failure using Operating System LogsJiahao Shi, Sihang Jiang, Bo Xu 0023, Yanghua Xiao. 486-496 [doi]
- Assessing and Improving Dataset and Evaluation Methodology in Deep Learning for Code Clone DetectionHaiyang Li, Qing Gao, Shikun Zhang. 497-508 [doi]
- Why Do Deep Learning Projects Differ in Compatible Framework Versionsƒ An Exploratory StudyHuashan Lei, Shuai Zhang, Jun Wang, Guanping Xiao, Yepang Liu 0001, Yulei Sui. 509-520 [doi]
- Multi-Objective White-Box Test Input Selection for Deep Neural Network Model EnhancementHongjing Guo, Chuanqi Tao, Zhiqiu Huang. 521-532 [doi]
- Fixing Robust Out-of-distribution Detection for Deep Neural NetworksZhiyang Zhou, Jie Liu 0008, Wensheng Dou, Shuo Li, Liangyi Kang, Muzi Qu, Dan Ye. 533-544 [doi]
- Evaluating Ethereum Reentrancy Detection Tools via Mutation TestingKaitai Zhu, Xingya Wang, Zhenyu Chen 0001, Song Huang, Junhua Wu. 545-555 [doi]
- PSCVFinder: A Prompt-Tuning Based Framework for Smart Contract Vulnerability DetectionLei Yu, Junyi Lu, Xianglong Liu, Li Yang, Fengjun Zhang, Jiajia Ma. 556-567 [doi]
- GraBit: A Sequential Model-Based Framework for Smart Contract Vulnerability DetectionHuijuan Zhu, Kaixuan Yang, Liangmin Wang 0001, Zhi-cheng Xu, Victor S. Sheng. 568-577 [doi]
- ConvMHSA-SCVD: Enhancing Smart Contract Vulnerability Detection through a Knowledge-Driven and Data-Driven FrameworkMengliang Li, Xiaoxue Ren, Han Fu, Zhuo Li, Jianling Sun. 578-589 [doi]
- IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug PredictionChen Zhang, Shuo Feng, Wenzhi Xie, Dongdong Zhao 0001, Jianwen Xiang, Roberto Pietrantuono, Roberto Natella, Domenico Cotroneo. 590-600 [doi]
- TraceStream: Anomalous Service Localization based on Trace Stream Clustering with Online FeedbackTong Zhou, Chenxi Zhang, Xin Peng 0001, Zhenghui Yan, Pairui Li, Jianming Liang, Haibing Zheng, Wujie Zheng, Yuetang Deng. 601-611 [doi]
- Detecting Interpreter Bugs via Filling Function Calls in Skeletal Program EnumerationXinmeng Xia, Yang Feng. 612-622 [doi]
- Enabling Efficient Assertion InferenceAayush Garg, Renzo Degiovanni, Facundo Molina, Maxime Cordy, Nazareno Aguirre, Mike Papadakis, Yves Le Traon. 623-634 [doi]
- Method-Level Bug Severity Prediction using Source Code Metrics and LLMsEhsan Mashhadi, Hossein Ahmadvand, Hadi Hemmati. 635-646 [doi]
- LLaMA-Reviewer: Advancing Code Review Automation with Large Language Models through Parameter-Efficient Fine-TuningJunyi Lu, Lei Yu, Xiaojia Li, Li Yang, Chun Zuo. 647-658 [doi]
- Resilience Assessment of Large Language Models under Transient Hardware FaultsUdit Kumar Agarwal, Abraham Chan, Karthik Pattabiraman. 659-670 [doi]
- ShellGPT: Generative Pre-trained Transformer Model for Shell Language UnderstandingJie Shi, Sihang Jiang, Bo Xu 0023, Jiaqing Liang, Yanghua Xiao, Wei Wang 0009. 671-682 [doi]
- Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained DecodingAndré Storhaug, Jingyue Li, Tianyuan Hu. 683-693 [doi]
- foREST: A Tree-based Black-box Fuzzing Approach for RESTful APIsJiaxian Lin, Tianyu Li, Yang Chen, Guangsheng Wei, Jiadong Lin, Sen Zhang, Hui Xu. 695-705 [doi]
- Fuzzing with Sequence Diversity Inference for Sequential Decision-making Model TestingKairui Wang, Yawen Wang, Junjie Wang 0001, Qing Wang 0001. 706-717 [doi]
- Value Peripheral Register Values for Fuzzing MCU FirmwareChunlin Wang, Hongliang Liang. 718-729 [doi]
- Characterizing Runtime Performance Variation in Error Detection by Duplicating InstructionsYafan Huang, Zhengyang He, Lingda Li, Guanpeng Li. 730-741 [doi]
- Dynamic Program Analysis with Flexible Instrumentation and Complex Event ProcessingChukri Soueidi, Yliès Falcone, Sylvain Hallé. 742-751 [doi]
- Precise Lazy Initialization for Programs with Complex Heap InputsJuan Manuel Copia, Facundo Molina, Nazareno Aguirre, Marcelo F. Frias, Alessandra Gorla, Pablo Ponzio. 752-762 [doi]
- A Probabilistic Delta Debugging Approach for Abstract Syntax TreesGuancheng Wang 0001, Yiqian Wu, Qihao Zhu, Yingfei Xiong 0001, Xin Zhang, Lu Zhang 0023. 763-773 [doi]
- OPTango: Multi-central Representation Learning against Innumerable Compiler Optimization for Binary DiffingHongna Geng, Ming Zhong, Peihua Zhang, Fang Lv, Xiaobing Feng 0002. 774-785 [doi]
- Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative FeaturesXin Liu 0050, yuan Tan, Xuan Hai, Qingchen Yu, Qingguo Zhou. 786-794 [doi]
- Automatic Static Vulnerability Detection for Machine Learning Libraries: Are We There Yet?Nima Shiri Harzevili, Jiho Shin, Junjie Wang 0001, Song Wang 0009, Nachiappan Nagappan. 795-806 [doi]