Abstract is missing.
- Detecting Build Dependency Errors in Incremental BuildsJun Lyu, Shanshan Li 0002, He Zhang 0001, Yang Zhang, Guoping Rong, Manuel Rigger. 1-12 [doi]
- Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via LogsShiwen Shan, Yintong Huo, Yuxin Su 0001, Yichen Li 0003, Dan Li 0016, Zibin Zheng. 13-25 [doi]
- FastLog: An End-to-End Method to Efficiently Generate and Insert Logging StatementsXiaoyuan Xie, Zhipeng Cai, Songqiang Chen, Jifeng Xuan. 26-37 [doi]
- FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based HypervisorZhenyu Ye, Lei Zhou, Fengwei Zhang, Wenqiang Jin, Zhenyu Ning, Yupeng Hu, Zheng Qin 0001. 38-50 [doi]
- Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language FeaturesDominik Helm, Tobias Roth, Sven Keidel, Michael Reif, Mira Mezini. 51-62 [doi]
- Precise Compositional Buffer Overflow Detection via Heap DisjointnessYiyuan Guo, Peisen Yao, Charles Zhang 0001. 63-75 [doi]
- Enhancing ROS System Fuzzing through Callback TracingYuheng Shen, Jianzhong Liu, Yiru Xu, Hao Sun, Mingzhe Wang, Nan Guan, Heyuan Shi, Yu Jiang 0001. 76-87 [doi]
- API Misuse Detection via Probabilistic Graphical ModelYunlong Ma, Wentong Tian, Xiang Gao 0012, Hailong Sun 0001, Li Li 0029. 88-99 [doi]
- Ma11y: A Mutation Framework for Web Accessibility TestingMahan Tafreshipour, Anmol Deshpande, Forough Mehralian, Iftekhar Ahmed 0001, Sam Malek. 100-111 [doi]
- Total Recall? How Good Are Static Call Graphs Really?Dominik Helm, Sven Keidel, Anemone Kampkötter, Johannes Düsing, Tobias Roth, Ben Hermann 0001, Mira Mezini. 112-123 [doi]
- CoderUJB: An Executable and Unified Java Benchmark for Practical Programming ScenariosZhengran Zeng, Yidong Wang, Rui Xie 0003, Wei Ye 0004, Shikun Zhang. 124-136 [doi]
- DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3Zhiying Wu, Jiajing Wu, Hui Zhang 0002, Ziwei Li, Jiachi Chen, Zibin Zheng, Qing Xia, Gang Fan, Yi Zhen. 137-148 [doi]
- CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity DetectionHao Wang, Zeyu Gao, Chao Zhang 0008, Mingyang Sun, Yuchen Zhou, Han Qiu 0001, Xi Xiao. 149-161 [doi]
- Interprocedural Path Complexity AnalysisMira Bhagirathi Kaniyur, Ana Cavalcante-Studart, Yihan Yang, Sangeon Park, David Chen, Duy Lam, Lucas Bang. 162-173 [doi]
- Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL ModelsMingyi Zhou, Xiang Gao 0012, Pei Liu, John Grundy 0001, Chunyang Chen, Xiao Chen 0002, Li Li 0029. 174-185 [doi]
- UPBEAT: Test Input Checks of Q# Quantum LibrariesTianmin Hu, Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Huanting Wang, Meng Li 0006, Zheng Wang 0001. 186-198 [doi]
- Enhancing Robustness of Code Authorship Attribution through Expert Feature KnowledgeXiaowei Guo, Cai Fu, Juan Chen, Hongle Liu, Lansheng Han, Wenjin Li. 199-209 [doi]
- A Large-Scale Empirical Study on Improving the Fairness of Image Classification ModelsJunjie Yang, Jiajun Jiang, Zeyu Sun 0004, Junjie Chen 0003. 210-222 [doi]
- A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We?Zhihan Jiang, Jinyang Liu, Junjie Huang 0008, Yichen Li 0003, Yintong Huo, Jiazhen Gu, Zhuangbin Chen, Jieming Zhu, Michael R. Lyu. 223-234 [doi]
- SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability DetectionXin-Cheng Wen, Cuiyun Gao, Shuzheng Gao, Yang Xiao 0011, Michael R. Lyu. 235-247 [doi]
- Distance-Aware Test Input Selection for Deep Neural NetworksZhong Li, Zhengfeng Xu, Ruihua Ji, Minxue Pan, Tian Zhang 0001, Linzhang Wang, Xuandong Li. 248-260 [doi]
- LPR: Large Language Models-Aided Program ReductionMengxiao Zhang, Yongqiang Tian 0001, ZhenYang Xu, Yiwen Dong 0002, Shin Hwei Tan, Chengnian Sun. 261-273 [doi]
- Bridge and Hint: Extending Pre-trained Language Models for Long-Range CodeYujia Chen, Cuiyun Gao, Zezhou Yang, Hongyu Zhang 0002, Qing Liao 0001. 274-286 [doi]
- Define-Use Guided Path Exploration for Better Forced ExecutionDongnan He, Dongchen Xie, Yujie Wang, Wei You, Bin Liang 0002, Jianjun Huang 0001, Wenchang Shi, Zhuo Zhang 0002, Xiangyu Zhang 0001. 287-299 [doi]
- C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta DebuggingXuezhi Song, Yijian Wu, Shuning Liu, Bihuan Chen 0001, Yun Lin 0001, Xin Peng 0001. 300-312 [doi]
- FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code CompletionQi Guo, Xiaohong Li 0001, Xiaofei Xie, Shangqing Liu, Ze Tang, Ruitao Feng, Junjie Wang 0001, JiDong Ge, Lei Bu. 313-324 [doi]
- MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination IndexingTianyi Yang, Cheryl Lee, Jiacheng Shen, Yuxin Su 0001, Cong Feng, Yongqiang Yang, Michael R. Lyu. 325-337 [doi]
- Isolation-Based Debugging for Neural NetworksJialuo Chen, Jingyi Wang 0004, Youcheng Sun, Peng Cheng 0001, Jiming Chen 0001. 338-349 [doi]
- Atlas: Automating Cross-Language Fuzzing on Android Closed-Source LibrariesHao Xiong, Qinming Dai, Rui Chang, Mingran Qiu, Renxiang Wang, Wenbo Shen, Yajin Zhou. 350-362 [doi]
- Automating Zero-Shot Patch Porting for Hard ForksShengyi Pan, You Wang, Zhongxin Liu, Xing Hu 0008, Xin Xia 0001, Shanping Li. 363-375 [doi]
- DiaVio: LLM-Empowered Diagnosis of Safety Violations in ADS Simulation TestingYou Lu, Yifan Tian, Yuyang Bi, Bihuan Chen 0001, Xin Peng 0001. 376-388 [doi]
- Graph Neural Networks for Vulnerability Detection: A Counterfactual ExplanationZhaoyang Chu, Yao Wan 0001, Qian Li 0003, Yang Wu, Hongyu Zhang 0002, Yulei Sui, Guandong Xu 0001, Hai Jin 0001. 389-401 [doi]
- DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi ApplicationsMaoyi Xie, Ming Hu 0003, Ziqiao Kong, Cen Zhang, Yebo Feng, Haijun Wang, Yue Xue, Hao Zhang 0004, Ye Liu 0012, Yang Liu 0003. 402-414 [doi]
- Traceback: A Fault Localization Technique for Molecular ProgramsMichael C. Gerten, James I. Lathrop, Myra B. Cohen. 415-427 [doi]
- Silent Taint-Style Vulnerability Fixes IdentificationZhongzhen Wen, Jiayuan Zhou, Minxue Pan, Shaohua Wang 0002, Xing Hu 0008, Tongtong Xu, Tian Zhang 0001, Xuandong Li. 428-439 [doi]
- Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial BugsYicheng Ouyang, Jun Yang, Lingming Zhang 0001. 440-452 [doi]
- Multi-modal Learning for WebAssembly Reverse EngineeringHanxian Huang, Jishen Zhao. 453-465 [doi]
- CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive NatureChenyan Liu, YuFan Cai, Yun Lin 0001, Yuhuan Huang, Yunrui Pei, Bo Jiang, Ping Yang, Jin Song Dong, Hong Mei 0001. 466-478 [doi]
- Automated Deep Learning Optimization via DSL-Based Source Code TransformationRuixin Wang, Minghai Lu, Cody Hao Yu, Yi-Hsiang Lai, Tianyi Zhang 0001. 479-490 [doi]
- Evaluating the Effectiveness of DecompilersYing Cao 0006, Runze Zhang, Ruigang Liang, Kai Chen 0012. 491-502 [doi]
- CLAP: Learning Transferable Binary Code Representations with Natural Language SupervisionHao Wang, Zeyu Gao, Chao Zhang 0008, Zihan Sha, Mingyang Sun, Yuchen Zhou, Wenyu Zhu, Wenju Sun, Han Qiu 0001, Xi Xiao. 503-515 [doi]
- FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas FeesYunqi Liu, Wei Song 0003. 516-527 [doi]
- FDI: Attack Neural Code Generation Systems through User Feedback ChannelZhensu Sun, Xiaoning Du 0001, Xiapu Luo, Fu Song, David Lo 0001, Li Li 0029. 528-540 [doi]
- Scalable, Sound, and Accurate Jump Table AnalysisHuan Nguyen 0004, Soumyakant Priyadarshan, R. Sekar 0001. 541-552 [doi]
- Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus EnginesCuiying Gao, Yueming Wu, Heng Li 0008, Wei Yuan, Haoyu Jiang, Qidan He, Yang Liu 0003. 553-565 [doi]
- LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart ContractsPeilin Zheng, Bowei Su, Xiapu Luo, Ting Chen 0002, Neng Zhang 0001, Zibin Zheng. 566-577 [doi]
- DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge DistillationMingke Yang, Yuqi Chen 0001, Yi Liu 0069, Ling Shi. 578-589 [doi]
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source SoftwareKaixuan Li 0002, Jian Zhang 0001, Sen Chen 0001, Han Liu 0012, Yang Liu 0003, Yixiang Chen. 590-602 [doi]
- Finding Cuts in Static Analysis Graphs to Debloat SoftwareChristoph Blumschein, Fabio Niephaus, Codrut Stancu, Christian Wimmer, Jens Lincke, Robert Hirschfeld. 603-614 [doi]
- Revisiting Test-Case Prioritization on Long-Running Test SuitesRunxiang Cheng, Shuai Wang, Reyhaneh Jabbarvand, Darko Marinov. 615-627 [doi]
- Oracle-Guided Program Selection from Large Language ModelsZhiyu Fan, Haifeng Ruan, Sergey Mechtaev, Abhik Roychoudhury. 628-640 [doi]
- Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable SystemsChuan Luo 0002, Shuangyu Lyu, Qiyuan Zhao, Wei Wu 0011, Hongyu Zhang 0002, Chunming Hu. 641-653 [doi]
- Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java ProgramsBenjamin Kushigian, Samuel J. Kaufman, Ryan Featherman, Hannah Potter, Ardi Madadi, René Just. 654-665 [doi]
- Testing Graph Database Systems with Graph-State Persistence OracleShuang Liu 0007, Junhao Lan, Xiaoning Du 0001, Jiyuan Li, Wei Lu 0015, Jiajun Jiang, Xiaoyong Du 0001. 666-677 [doi]
- Test Selection for Deep Neural Networks using Meta-Models with Uncertainty MetricsDemet Demir, Aysu Betin-Can, Elif Sürer. 678-690 [doi]
- An Empirical Study of Static Analysis Tools for Secure Code ReviewWachiraphan Charoenwet 0001, Patanamon Thongtanunam, Van-Thuan Pham, Christoph Treude. 691-703 [doi]
- VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information ExtractionThanh-Dat Nguyen, Tung Do-Viet, Hung Nguyen Duy, Tuan-Hai Luu, Hung Le, Bach Le, Patanamon Thongtanunam. 704-716 [doi]
- Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World ScenesXiaoyi Yang, Yuxing Wang, Tahmid Rafi, Dongfang Liu, Xiaoyin Wang, Xueling Zhang. 717-729 [doi]
- Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoCHaolai Wei, Liwei Chen, Zhijie Zhang, Gang Shi, Dan Meng. 730-742 [doi]
- SQLess: Dialect-Agnostic SQL Query SimplificationLi Lin, Zongyin Hao, Chengpeng Wang, Zhuangda Wang, Rongxin Wu, Gang Fan. 743-754 [doi]
- DBStorm: Generating Various Effective Workloads for Testing Isolation LevelsKeqiang Li, Siyang Weng, Lyu Ni, Chengcheng Yang, Rong Zhang 0002, Xuan Zhou 0001, Aoying Zhou. 755-767 [doi]
- Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-Call BugsArooba Shahoor, Jooyong Yi, Dongsun Kim 0001. 768-780 [doi]
- Feedback-Directed Partial ExecutionIshrak Hayet, Adam Scott, Marcelo d'Amorim. 781-793 [doi]
- Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential AnalysisMingxi Ye, Xingwei Lin, Yuhong Nan, Jiajing Wu, Zibin Zheng. 794-805 [doi]
- Certified Continual Learning for Neural Network RegressionLong H. Pham, Jun Sun 0001. 806-818 [doi]
- Automated Program Repair via Conversation: Fixing 162 out of 337 Bugs for $0.42 Each using ChatGPTChunqiu Steven Xia, Lingming Zhang 0001. 819-831 [doi]
- DDGF: Dynamic Directed Greybox Fuzzing with Path ProfilingHaoran Fang, Kaikai Zhang, Donghui Yu, Yuanyuan Zhang 0002. 832-843 [doi]
- VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation TestingZhongrui Li, Jiarun Dai, Zongan Huang, Nianhao You, Yuan Zhang 0009, Min Yang 0002. 844-855 [doi]
- BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming AssignmentsLinna Xie, Chongmin Li, Yu Pei 0001, Tian Zhang 0001, Minxue Pan. 856-868 [doi]
- Synthesis-Based Enhancement for GUI Test Case MigrationYakun Zhang, Qihao Zhu, Jiwei Yan, Chen Liu, Wenjie Zhang 0007, Yifan Zhao, Dan Hao 0001, Lu Zhang 0023. 869-881 [doi]
- CREF: An LLM-Based Conversational Software Repair Framework for Programming TutorsBoyang Yang, Haoye Tian, Weiguo Pian, Haoran Yu, Haitao Wang, Jacques Klein, Tegawendé F. Bissyandé, Shunfu Jin. 882-894 [doi]
- Datactive: Data Fault Localization for Object Detection SystemsYining Yin, Yang Feng 0003, Shihao Weng, Yuan Yao 0001, Jia Liu, Zhihong Zhao. 895-907 [doi]
- Interpretability Based Neural Network RepairZuohui Chen, Jun Zhou, Youcheng Sun, Jingyi Wang 0004, Qi Xuan, Xiaoniu Yang. 908-919 [doi]
- Exploration-Driven Reinforcement Learning for Avionic System Fault Detection (Experience Paper)Paul-Antoine Le Tolguenec, Emmanuel Rachelson, Yann Besse, Florent Teichteil-Königsbuch, Nicolas Schneider, Hélène Waeselynck, Dennis Wilson. 920-931 [doi]
- Semantic Constraint Inference for Web Form Test GenerationParsa Alian, Noor Nashid, Mobina Shahbandeh, Ali Mesbah 0001. 932-944 [doi]
- Call Graph Soundness in Android Static AnalysisJordan Samhi, René Just, Tegawendé F. Bissyandé, Michael D. Ernst, Jacques Klein. 945-957 [doi]
- Guardian: A Runtime Framework for LLM-Based UI ExplorationDezhi Ran, Hao Wang 0112, Zihe Song, Mengzhou Wu, Yuan Cao, Ying Zhang 0012, Wei Yang 0013, Tao Xie 0001. 958-970 [doi]
- NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android AppsJikai Wang, Haoyu Wang 0001. 971-982 [doi]
- Efficient DNN-Powered Software with Fair Sparse ModelsXuanqi Gao, Weipeng Jiang, Juan Zhai, ShiQing Ma, Xiaoyu Zhang, Chao Shen 0001. 983-995 [doi]
- Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace CheckingWeilin Luo, Pingjia Liang, Junming Qiu, Polong Chen, Hai Wan, Jianfeng Du, Weiyuan Fang. 996-1008 [doi]
- DeLink: Source File Information Recovery in BinariesZhe Lang, Zhengzi Xu, Xiaohui Chen, Shichao Lv, Zhanwei Song, Zhiqiang Shi, Limin Sun 0001. 1009-1021 [doi]
- Your "Notice" Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during ForkingKaifeng Huang 0001, Yingfeng Xia, Bihuan Chen 0001, Siyang He, Huazheng Zeng, Zhuotong Zhou, Jin Guo, Xin Peng 0001. 1022-1034 [doi]
- Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode MutationWenxuan Zhao, Ruiying Zeng, Yangfan Zhou. 1035-1047 [doi]
- Feedback-Driven Automated Whole Bug Report Reproduction for Android AppsDingbang Wang, Yu Zhao 0010, Sidong Feng, Zhaoxu Zhang, William G. J. Halfond, Chunyang Chen, Xiaoxia Sun, Jiangfan Shi, Tingting Yu. 1048-1060 [doi]
- UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program TestingYifeng He, Jiabo Huang, Yuyang Rong, Yiwen Guo, Ethan Wang, Hao Chen 0003. 1061-1072 [doi]
- When to Stop? Towards Efficient Code Generation in LLMs with Excess Token PreventionLianghong Guo, Yanlin Wang 0001, Ensheng Shi, Wanjun Zhong, Hongyu Zhang 0002, Jiachi Chen, Ruikai Zhang, Yuchi Ma, Zibin Zheng. 1073-1085 [doi]
- Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario FuzzingTong Wang, Taotao Gu, Huan Deng, Hu Li, Xiaohui Kuang, Gang Zhao. 1086-1098 [doi]
- AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar InferenceHyungseok Kim 0002, Soomin Kim 0002, Jungwoo Lee, Sang Kil Cha. 1099-1111 [doi]
- Better Not Together: Staged Solving for Context-Free Language ReachabilityChenghang Shi, Haofeng Li, Jie Lu 0009, Lian Li 0002. 1112-1123 [doi]
- AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code GenerationZhensu Sun, Xiaoning Du 0001, Zhou Yang 0003, Li Li 0029, David Lo 0001. 1124-1136 [doi]
- FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target GenerationXizhe Yin, Yang Feng 0003, Qingkai Shi, Zixi Liu, Hongwang Liu, Baowen Xu. 1137-1148 [doi]
- Segment-Based Test Case Prioritization: A Multi-objective ApproachHieu Huynh, Nhu Pham, Tien N. Nguyen, Vu Nguyen 0003. 1149-1160 [doi]
- Understanding Misconfigurations in ROS: An Empirical Study and Current ApproachesPaulo Canelas, Bradley R. Schmerl, Alcides Fonseca, Christopher Steven Timperley. 1161-1173 [doi]
- Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic AlignmentJiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen 0004, Shouling Ji, Jianhai Chen, Jundong Xie, Long Liu. 1174-1185 [doi]
- Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMTElvira Albert, Jesús Correas, Pablo Gordillo, Guillermo Román-Díez, Albert Rubio. 1186-1197 [doi]
- Identifying Smart Contract Security Issues in Code Snippets from Stack OverflowJiachi Chen, Chong Chen, Jiang Hu, John C. Grundy, Yanlin Wang 0001, Ting Chen 0002, Zibin Zheng. 1198-1210 [doi]
- Domain Adaptation for Code Model-Based Unit Test Case GenerationJiho Shin, Sepehr Hashtroudi, Hadi Hemmati, Song Wang 0009. 1211-1222 [doi]
- How Effective Are They? Exploring Large Language Model Based Fuzz Driver GenerationCen Zhang, Yaowen Zheng, Mingqiang Bai, Yeting Li, Wei Ma, Xiaofei Xie, Yuekang Li, Limin Sun 0001, Yang Liu 0003. 1223-1235 [doi]
- Commit Artifact Preserving Build PredictionGuoqing Wang, Zeyu Sun 0004, Yizhou Chen, Yifan Zhao, Qingyuan Liang, Dan Hao 0001. 1236-1248 [doi]
- Toward the Automated Localization of Buggy Mobile App UIs from Bug DescriptionsAntu Saha, Yang Song, Junayed Mahmud, Ying Zhou, Kevin Moran, Oscar Chaparro. 1249-1261 [doi]
- WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary GenerationShangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang 0001, Haoyu Wang 0001. 1262-1273 [doi]
- ThinkRepair: Self-Directed Automated Program RepairXin Yin, Chao Ni 0001, Shaohua Wang 0002, Zhenhao Li 0002, Limin Zeng, Xiaohu Yang 0001. 1274-1286 [doi]
- Fuzzing MLIR Compiler Infrastructure via Operation Dependency AnalysisChenyao Suo, Junjie Chen 0003, Shuang Liu 0007, Jiajun Jiang, Yingquan Zhao, Jianrong Wang. 1287-1299 [doi]
- Evaluating Deep Neural Networks in Deployment: A Comparative Study (Replicability Study)Eduard Pinconschi, Divya Gopinath, Rui Abreu 0001, Corina S. Pasareanu. 1300-1311 [doi]
- Towards Understanding the Bugs in Solidity CompilerHaoyang Ma, Wuqi Zhang, Qingchao Shen, Yongqiang Tian 0001, Junjie Chen 0003, Shing-Chi Cheung. 1312-1324 [doi]
- Foliage: Nourishing Evolving Software by Characterizing and Clustering Field BugsZhanyao Lei, Yixiong Chen, Mingyuan Xia, Zhengwei Qi. 1325-1337 [doi]
- Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided RefinementGwihwan Go, Chijin Zhou, Quan Zhang, Xiazijian Zou, Heyuan Shi, Yu Jiang 0001. 1338-1350 [doi]
- Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative PrioritizationZhijie Zhang, Liwei Chen, Haolai Wei, Gang Shi, Dan Meng. 1351-1363 [doi]
- Bugs in Pods: Understanding Bugs in Container Runtime SystemsJiongchi Yu, Xiaofei Xie, Cen Zhang, Sen Chen 0001, Yuekang Li, Wenbo Shen. 1364-1376 [doi]
- Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property GraphXiaoyong Yan, Biao He, Wenbo Shen, Yu Ouyang, Kaihang Zhou, Xingjian Zhang 0005, Xingyu Wang, Yukai Cao, Rui Chang. 1377-1388 [doi]
- SelfPiCo: Self-Guided Partial Code Execution with LLMsZhipeng Xue, Zhipeng Gao, Shaohua Wang 0002, Xing Hu 0008, Xin Xia 0001, Shanping Li. 1389-1401 [doi]
- Neurosymbolic Repair of Test FlakinessYang Chen, Reyhaneh Jabbarvand. 1402-1414 [doi]
- Inconsistencies in TeX-Produced DocumentsJovyn Tan, Manuel Rigger. 1415-1427 [doi]
- CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decodingDong Li, Meng Yan 0001, Yaosheng Zhang, Zhongxin Liu, Chao Liu 0014, Xiaohong Zhang 0002, Ting Chen 0002, David Lo 0001. 1428-1439 [doi]
- Following the "Thread": Toward Finding Manipulatable Bottlenecks in Blockchain ClientsShuohan Wu, Zihao Li 0001, Hao Zhou 0009, Xiapu Luo, Jianfeng Li 0006, Haoyu Wang 0003. 1440-1452 [doi]
- CooTest: An Automated Testing Approach for V2X Communication SystemsAn Guo, Xinyu Gao, Zhenyu Chen 0001, Yuan Xiao 0003, Jiakai Liu, Xiuting Ge, Weisong Sun, Chunrong Fang. 1453-1465 [doi]
- Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model ConvertersPurvish Jajal, Wenxin Jiang 0001, Arav Tewari, Erik Kocinare, Joseph Woo, Anusha Sarraf, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis 0001. 1466-1478 [doi]
- TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model DevelopmentXiangshan Gao, Jialuo Chen, Jingyi Wang 0004, Jie Shi, Peng Cheng 0001, Jiming Chen 0001. 1479-1490 [doi]
- Enhancing Multi-agent System Testing with Diversity-Guided Exploration and Adaptive Critical State ExploitationXuyan Ma, Yawen Wang, Junjie Wang 0001, Xiaofei Xie, Boyu Wu, Shoubin Li, Fanjiang Xu, Qing Wang 0001. 1491-1503 [doi]
- Reproducing Timing-Dependent GUI Flaky Tests in Android Apps via a Single Event DelayXiaobao Cai, Zhen Dong, Yongjiang Wang, Abhishek Tiwari 0001, Xin Peng 0001. 1504-1515 [doi]
- Arfa: An Agile Regime-Based Floating-Point Optimization Approach for Rounding ErrorsJinchen Xu, Mengqi Cui, Fei Li, Zuoyan Zhang, Hongru Yang, Bei Zhou, Jie Zhao 0002. 1516-1528 [doi]
- One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural NetworkDi Cui, Qiangqiang Wang, Yutong Zhao, Jiaqi Wang, Minjie Wei, Jingzhao Hu, Luqiao Wang, Qingshan Li. 1529-1540 [doi]
- NeuFair: Neural Network Fairness Repair with DropoutVishnu Asutosh Dasu, Ashish Kumar, Saeid Tizpaz Niari, Gang Tan. 1541-1553 [doi]
- One Size Does Not Fit All: Multi-granularity Patch Generation for Better Automated Program RepairBo Lin, Shangwen Wang, Ming Wen 0001, Liqian Chen, Xiaoguang Mao. 1554-1566 [doi]
- Policy Testing with MDPFuzz (Replicability Study)Quentin Mazouni, Helge Spieker, Arnaud Gotlieb, Mathieu Acher. 1567-1578 [doi]
- Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware PromptsHao Guan, Guangdong Bai, Yepang Liu 0001. 1579-1591 [doi]
- AutoCodeRover: Autonomous Program ImprovementYuntong Zhang 0002, Haifeng Ruan, Zhiyu Fan, Abhik Roychoudhury. 1592-1604 [doi]
- See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network TestingYuanyuan Yuan, Shuai Wang 0011, Zhendong Su 0001. 1605-1617 [doi]
- Practitioners' Expectations on Automated Test GenerationXiao Yu 0008, Lei Liu, Xing Hu 0008, Jacky Keung, Xin Xia 0001, David Lo 0001. 1618-1630 [doi]
- An Empirical Examination of Fuzzer Mutator PerformanceJames Kukucka, Luís Pina, Paul Ammann, Jonathan Bell 0001. 1631-1642 [doi]
- LLM4Fin: Fully Automating LLM-Powered Test Case Generation for FinTech Software Acceptance TestingZhiyi Xue, Liangguo Li, Senyue Tian, Xiaohong Chen 0007, Pingping Li, Liangyu Chen 0001, Tingting Jiang 0012, Min Zhang 0002. 1643-1655 [doi]
- Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based MutationJueon Eom, Seyeon Jeong, Taekyoung Kwon 0002. 1656-1668 [doi]
- Decomposition of Deep Neural Networks into Modules via Mutation AnalysisAli Ghanbari 0001. 1669-1681 [doi]
- Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced AnalysisShuwei Song, Jiachi Chen, Ting Chen 0002, Xiapu Luo, Teng Li, Wenwu Yang, Leqing Wang, Weijie Zhang, Feng Luo, Zheyuan He, Yi Lu, Pan Li. 1682-1694 [doi]
- Testing Gremlin-Based Graph Database Systems via Query DisassemblingYingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Yu Gao 0002, Jiansen Song, Liang Xu, Jiaxin Zhu, Wei Wang, Jun Wei 0001, Hua Zhong 0007, Tao Huang 0001. 1695-1707 [doi]
- Synthesizing Boxes Preconditions for Deep Neural NetworksZengyu Liu, Liqian Chen, Wanwei Liu, Ji Wang 0001. 1708-1719 [doi]
- Logos: Log Guided Fuzzing for Protocol ImplementationsFeifan Wu, Zhengxiong Luo, Yanyang Zhao, Qingpeng Du, Junze Yu, Ruikang Peng, Heyuan Shi, Yu Jiang 0001. 1720-1732 [doi]
- Large Language Models for Equivalent Mutant Detection: How Far Are We?Zhao Tian, Honglin Shu, Dong Wang, Xuejie Cao, Yasutaka Kamei, Junjie Chen 0003. 1733-1745 [doi]
- An Empirical Study on Kubernetes Operator BugsQingxin Xu, Yu Gao 0002, Jun Wei 0001. 1746-1758 [doi]
- Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced DatasetZeliang Yu, Ming Wen 0001, Xiaochen Guo, Hai Jin 0001. 1759-1771 [doi]
- Characterizing and Detecting Program Representation Faults of Static Analysis FrameworksHuaien Zhang, Yu Pei 0001, Shuyun Liang, Zezhong Xing, Shin Hwei Tan. 1772-1784 [doi]
- Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code TasksYuxin Qiu, Jie Hu, Qian Zhang, Heng Yin 0001. 1785-1797 [doi]
- An In-Depth Study of Runtime Verification Overheads during Software TestingKevin Guan, Owolabi Legunsen. 1798-1810 [doi]
- The Flexcrash Platform for Testing Autonomous Vehicles in Mixed-Traffic ScenariosAlessio Gambi, Shreya Mathews, Benedikt Steininger, Mykhailo Poienko, David Bobek. 1811-1815 [doi]
- SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly BinariesNingyu He, Zhehao Zhao, Hanqin Guan, Jikai Wang, Shuo Peng, Ding Li 0001, Haoyu Wang 0001, Xiangqun Chen, Yao Guo 0001. 1816-1820 [doi]
- Testing Concurrent Algorithms on JVM with Lincheck and IntelliJ IDEAAleksandr Potapov, Maksim Zuev, Evgenii Moiseenko, Nikita Koval. 1821-1825 [doi]
- DMMPP: Constructing Dummy Main Methods for Android Apps with Path-Sensitive PredicatesBaoquan Cui, Jiwei Yan, Jian Zhang 0001. 1826-1830 [doi]
- JCWIT: A Correctness-Witness Validator for Java Programs Based on Bounded Model CheckingZaiyu Cheng, Tong Wu, Peter Schrammel, Norbert Tihanyi, Eddie B. de Lima Filho, Lucas C. Cordeiro. 1831-1835 [doi]
- ESBMC-Python: A Bounded Model Checker for Python ProgramsBruno Farias 0001, Rafael Menezes, Eddie B. de Lima Filho, Youcheng Sun, Lucas C. Cordeiro. 1836-1840 [doi]
- PolyTracker: Whole-Input Dynamic Information Flow TracingEvan Sultanik, Marek Surovic, Henrik Brodin, Kelly Kaoudis, Facundo Tuesca, Carson Harmon, Lisa Overall, Joseph Sweeney, Bradford Larsen. 1841-1845 [doi]
- FRAFOL: FRAmework FOr Learning mutation testingPedro Tavares, Ana C. R. Paiva, Domenico Amalfitano, René Just. 1846-1850 [doi]
- HECS: A Hypergraph Learning-Based System for Detecting Extract Class Refactoring OpportunitiesLuqiao Wang, Qiangqiang Wang, Jiaqi Wang, Yutong Zhao, Minjie Wei, Zhou Quan, Di Cui, Qingshan Li. 1851-1855 [doi]
- FixCheck: A Tool for Improving Patch Correctness AnalysisFacundo Molina, Juan Manuel Copia, Alessandra Gorla. 1856-1860 [doi]
- Generalized Concurrency Testing Tool for Distributed SystemsEge Berkay Gulcan, João Neto, Burcu Kulahcioglu Ozkan. 1861-1865 [doi]
- SMBugFinder: An Automated Framework for Testing Protocol Implementations for State Machine BugsPaul Fiterau-Brostean, Bengt Jonsson 0001, Konstantinos Sagonas, Fredrik Tåquist. 1866-1870 [doi]
- Panda: A Concurrent Scheduler for Compiler-Based ToolsXutong Ma, Jiwei Yan, Jun Yan 0009, Jian Zhang 0001. 1871-1875 [doi]
- FunRedisp: A Function Redispatch Tool to Reduce Invocation Gas Fees in Solidity Smart ContractsYunqi Liu, Wei Song 0003. 1876-1880 [doi]
- Robustness against the C/C++11 Memory ModelRoy Margalit. 1881-1885 [doi]
- Learning the Effects of Software ChangesLaura Plein. 1886-1890 [doi]
- Soft Verification for Actor Contract SystemsBram Vandenbogaerde. 1891-1895 [doi]
- From Fault Injection to Formal Verification: A Holistic Approach to Fault Diagnosis in Cyber-Physical SystemsDrishti Yadav. 1896-1900 [doi]
- Shaping Test Inputs in Grammar-Based FuzzingJosé Antonio Zamudio Amaya. 1901-1905 [doi]
- Leveraging Natural Language Processing and Data Mining to Augment and Validate APIsAlix Decrop. 1906-1908 [doi]
- Decentralized Near-Synchronous Local-First Programming CollaborationLeon Freudenthaler. 1909-1911 [doi]
- Integrating Mutation Techniques to Keep Specification and Source Code in SyncKerstin Jacob. 1912-1914 [doi]
- Quality Assurance for Non-trivial Systems: Use Case GCC PluginsNimantha Kariyakarawana. 1915-1916 [doi]
- Search-Based Translations for Tensor OperationsJie Qiu. 1917-1919 [doi]
- Automated Testing of Networked Systems ReliabilityMichal Rozsíval. 1920-1922 [doi]
- Graph Learning for Extract Class RefactoringLuqiao Wang. 1923-1925 [doi]
- Collaboration to Repository-Level Vulnerability DetectionXin-Cheng Wen. 1926-1928 [doi]