Oct 25 - 28, 2021
Onsite
Notice: CST: China Standard Time
Sessions 1: Code Analysis and AI for Dependability (Mon Oct 25, 14:00-15:30 CST, Session Chair: Long Wang, Tsinghua University)
A Static Analysis Framework for Detecting Bugs in Introductory Programs
Wenchu Xu (Nanjing University) and Yanran Ma (Foreign Language School)
SourceSnippet2Binary: A Method for Searching Vulnerable Source Code Snippets in Binaries
Qinqin Wu ( Guangdong Power Dispatching and Controlling Center), Hao Huang ( Guangdong Power Dispatching and Controlling Center), Yi Tang ( Guangdong Power Dispatching and Controlling Center), Zhenwei Gu ( Guangdong Power Dispatching and Controlling Center) and Ang Jia ( Xi'an Jiaotong University)
Exception Handling Recommendation Based on Self-Attention Network
Kai Lin (Nanjing University of Aeronautics and Astronautics), Chuanqi Tao (Nanjing University of Aeronautics and Astronautics) and Zhiqiu Huang (Nanjing University of Aeronautics and Astronautics)
Sessions 2: Systems Engineering (Mon Oct 25, 16:00-17:10 CST, Session Chair: Hui Xu, Fudan University)
ColocationSim: Simulate Colocation Datacenter with Microservices and Performance Interference
Kangjin Wang (Peking University) and Ying Li (Peking University)
A Runtime Monitoring Based Fuzzing Framework for Temporal Properties
Jinjian Luo (National University of Defense Technology), Meixi Liu (National University of Defense Technology), Yunlai Luo (National University of Defense Technology), Zhenbang Chen (National University of Defense Technology) and Yufeng Zhang (Hunan University)
RusBox: Towards Efficient and Adaptive Sandboxing for Rust
Wanrong Ouyang (University of Science and Technology of China) and Baojian Hua (University of Science and Technology of China)
Online
Notice: UTC: Coordinated Universal Time
Sessions 1: Program Code Analysis (Tue Oct 26, 16:15-16:45 UTC, Session Chair: Marcello Cinque, University of Naples Federico II)
Targeted Code Inspection based on Human Errors
Fuqun Huang (University of Coimbra) and Henrique Madeira (University of Coimbra)
A Static Analysis Framework for Detecting Bugs in Introductory Programs
Wenchu Xu (Nanjing University) and Yanran Ma (Foreign Language School)
SourceSnippet2Binary: A Method for Searching Vulnerable Source Code Snippets in Binaries
Qinqin Wu (Guangdong Power Dispatching and Controlling Center), Hao Huang ( Guangdong Power Dispatching and Controlling Center), Yi Tang ( Guangdong Power Dispatching and Controlling Center), Zhenwei Gu ( Guangdong Power Dispatching and Controlling Center) and Ang Jia ( Xi'an Jiaotong University)
Dynamic Filtering and Prioritization of Static Code Analysis Alerts
Ulas Yuksel (Vestel Electronics) and Hasan Sozer (Ozyegin University)
Sessions 2: Systems Engineering (Tue Oct 26, 16:45-17:15 UTC, Session Chair: Long Wang, Tsinghua University)
Rustpi: A Rust-powered Reliable Micro-kernel Operating System
Yuanzhi Liang (Beihang University), Lei Wang (Beihang University), Siran Li (Beihang University) and Bo Jiang (Beihang University)
Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality Systems
Marco Barletta (University of Naples Federico II), Marcello Cinque (University of Naples Federico II) and Raffaele Della Corte (Critiware S.r.l.)
ColocationSim: Simulate Colocation Datacenter with Microservices and Performance Interference
Kangjin Wang (Peking University) and Ying Li (Peking University)
A Runtime Monitoring Based Fuzzing Framework for Temporal Properties
Jinjian Luo (National University of Defense Technology), Meixi Liu (National University of Defense Technology), Yunlai Luo (National University of Defense Technology), Zhenbang Chen (National University of Defense Technology) and Yufeng Zhang (Hunan University)
RusBox: Towards Efficient and Adaptive Sandboxing for Rust
Wanrong Ouyang (University of Science and Technology of China) and Baojian Hua (University of Science and Technology of China)
Sessions 3: Software Engineering & Security (Wed Oct 27, 16:15-16:45 UTC, Session Chair: Damiano Torre, Texas A&M University at Central Texas)
Assurance Carrying Code for Software Supply Chain
Yutaka Matsuno (Nihon University), Yoriyuki Yamagata (National Institute of Advanced Industrial Science and Technology (AIST)), Hideaki Nishihara (National Institute of Advanced Industrial Science and Technology (AIST)) and Yuichiro Hosokawa (Gunma Prefectural Women's University)
When is Continuous Integration Useful? Empirical Study on Team Size and Reporters in Development
Naoko Imai (Waseda University), Hironori Washizaki (Waseda University), Naohiko Tsuda (Waseda University) and Yoshiaki Fukazawa (Waseda University)
Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols
Marek R. Ogiela (AGH University of Science and Technology) and Lidia Ogiela (Pedagogical University of Krakow)
Software Security Readiness and Deployment
Saikath Bhattacharya (North Carolina State University), Munindar P. Singh (North Carolina State University) and Laurie Williams (North Carolina State University)
Sessions 4: Data-Driven Dependability (Wed Oct 27, 16:45-17:15 UTC, Session Chair: Catello Di Martino, Nokia Bell Labs)
Exception Handling Recommendation Based on Self-Attention Network
Kai Lin (Nanjing University of Aeronautics and Astronautics), Chuanqi Tao (Nanjing University of Aeronautics and Astronautics) and Zhiqiu Huang (Nanjing University of Aeronautics and Astronautics)
Information Hiding using Bucket Steganography
Katarzyna Koptyra (AGH University of Science and Technology) and Marek R. Ogiela (AGH University of Science and Technology)
Multi-Feature Fusion based Image Steganography using GAN
Zhen Wang (School of Computer Science and Technology, Shanghai University of Electric Power), Zhen Zhang (School of Computer Science and Technology, Shanghai University of Electric Power) and Jianhui Jiang (School of Software Engineering, Tongji University)
Online Log Parsing: Preliminary Literature Review
Scott Lupton (Waseda University), Hironori Washizaki (Waseda University), Nobukazu Yoshioka (Waseda University) and Yoshiaki Fukazawa (Waseda University)