Oct 25 - 28, 2021
Onsite
Notice: CST: China Standard Time
Best Research Paper Nominees (Tue Oct 26, 10:30-12:30 CST, Session Chair: Zheng Zheng)
Tensfa: Detecting and Repairing Tensor Shape Faults in Deep Learning Systems
Dangwei Wu (Shanghai Jiao Tong University), Beijun Shen (Shanghai Jiao Tong University), Yuting Chen (Shanghai Jiao Tong University), He Jiang (Dalian University of Technology) and Lei Qiao (Beijing Institute of Control Engineering)
Expanding Fix Patterns to Enable Automatic Program Repair
Vesna Nowack (Queen Mary University of London), David Bowes (Lancaster University), Steve Counsell (Brunel University), Tracy Hall (Lancaster University), Saemundur Haraldsson (Stirling University), Emily Winter (Lancaster University) and John Woodward (Queen Mary University of London)
Lessons Learned from the Development of a Mechanical Ventilator for COVID-19
Andrea Bombarda (University of Bergamo), Silvia Bonfanti (University of Bergamo), Cristiano Galbiati (Princeton University), Angelo Gargantini (University of Bergamo), Patrizio Pelliccione (GSSI - Gran Sasso Science Institute), Elvinia Riccobene (Computer Science Dept., University of Milan), and Masayuki Wada (AstroCeNT, Nicolaus Copernicus Astronomical Center, Polish Academy of Sciences)
How Long Will it Take to Mitigate this Incident for Online Service Systems?
Weijing Wang (College of Intelligence and Computing, Tianjin University), Junjie Chen (College of Intelligence and Computing, Tianjin University), Lin Yang (Tianjin University), Hongyu Zhang (The University of Newcastle), Pu Zhao (Microsoft Research), Bo Qiao (Microsoft Research), Yu Kang (Microsoft Research), Qingwei Lin (Microsoft Research), Saravanakumar Rajmohan (Microsoft 365), Feng Gao (Microsoft Azure), Zhangwei Xu (Microsoft Azure), Yingnong Dang (Microsoft Azure) and Dongmei Zhang (Microsoft Research)
Session 1: Anomaly Detection (Tue Oct 26, 14:00-15:30 CST, Session Chair: Shenglin Zhang)
LogFlash: Real-time Streaming Anomaly Detection and Diagnosis from System Logs for Large-scale Software Systems
Tong Jia (Peking University), Yifan Wu (Peking University), Chuanjia Hou (Peking University) and Ying Li (Peking University)
Identifying Root-Cause Metrics for Incident Diagnosis in Online Service Systems
Canhua Wu (Tsinghua University), Nengwen Zhao (Tsinghua University), Lixin Wang (China Construction Bank), Xiaoqin Yang (China Construction Bank), Shining Li (China Construction Bank), Ming Zhang (China Construction Bank), Xing Jin (China Construction Bank), Xidao Wen (Tsinghua University), Xiaohui Nie (Tsinghua University), Wenchi Zhang (BizSeer), Kaixin Sui (BizSeer) and Dan Pei (Tsinghua University)
Robust KPI Anomaly Detection for Large-Scale Software Services with Partial Labels
Shenglin Zhang (Nankai University), Chenyu Zhao (Nankai University), Yicheng Sui (Nankai University), Ya Su (Tsinghua University), Yongqian Sun (Nankai University), Yuzhi Zhang (Nankai University), Dan Pei (Tsinghua University) and Yizhe Wang (Beijing Bohong Keyuan Information Technology Co. LTD)
Session 2: Program and Bug Analysis (Tue Oct 26, 14:00-15:30 CST, Session Chair: Hui Xu)
Static Bound Analysis of Dynamically Allocated Resources for C Programs
Guangsheng Fan (National University of Defense Technology), Taoqing Chen (National University of Defense Technology), Banghu Yin (National University of Defense Technology), Liqian Chen (National University of Defense Technology), Tengbin Wang (National University of Defense Technology) and Ji Wang (National University of Defense Technology)
Automatically Identifying Bug Reports with Tactical Vulnerabilities by Deep Feature Learning
Wei Zheng (College of Software and Microelectronics, Northwest Polytechnic University), Manqing Zhang (Northwestern Polytechnical University), Hui Tang (Northwestern Polytechnical University), Yuanfang Cai (Drexel University), Xiang Chen (Nantong University), Xiaoxue Wu (Yangzhou University) and Abubakar Omari Abdallah Semasaba (Northwestern Polytechnical University)
Static Type Inference for Foreign Functions of Python
Mingzhe Hu (University of Science and Technology of China), Yu Zhang (University of Science and Technology of China), Wenchao Huang (University of Science and Technology of China) and Yan Xiong (University of Science and Technology of China)
Session 3: Vulnerability and Security (Tue Oct 26, 16:00-18:00 CST, Session Chair: Ming Wen)
PyGuard: Finding and Understanding Vulnerabilities in Python Virtual Machines
Chengman Jiang (University of Science and Technology of China), Baojian Hua (University of Science and Technology of China), Wanrong Ouyang (University of Science and Technology of China), Qiliang Fan (University of Science and Technology of China) and Zhizhong Pan (University of Science and Technology of China)
Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing
Yang Shi (Tongji University), Mianhong Li (Tongji University), Wujing Wei (Tongji University), Yangyang Liu (The Hong Kong Polytechnic University) and Xiapu Luo (The Hong Kong Polytechnic University)
VulSPG: Vulnerability detection based on slice property graph representation learning
Weining Zheng (Harbin Institute of Technology), Yuan Jiang (Harbin Institute of Technology) and Xiaohong Su (Harbin Institute of Technology)
Eager Falsification For Accelerating Robustness Verification of Deep Neural Networks
Xingwu Guo (East China Normal University), Wenjie Wan (ByteDance Privacy and Security), Zhaodi Zhang (East China Normal University), Min Zhang (East China Normal University), Fu Song (School of Information Science and Technology, ShanghaiTech University) and Xuejun Wen (Huawei Technologies)
Session 4: Quality Assessment and Assurance (Wed Oct 27, 14:00-15:30 CST, Session Chair: Yang Feng)
Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems
Guanping Xiao (Nanjing University of Aeronautics and Astronautics), Jun Liu (Nanjing University of Aeronautics and Astronautics), Zheng Zheng (Beihang University) and Yulei Sui (University of Technology Sydney)
Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps
Sen Chen (Tianjin University), Lingling Fan (Nankai University), Cuiyun Gao (Harbin Institute of Technology (Shenzhen)), Fu Song (ShanghaiTech University) and Yang Liu (Nanyang Technological University)
Improving Code Summarization Through Automated Quality Assurance
Yuxing Hu (Chongqing University), Meng Yan (Chongqing University), Zhongxin Liu (Zhejiang University), Qiuyuan Chen (Zhejiang University) and Bei Wang (Chongqing University)
Session 5: Reliability and Deep Learning (Wed Oct 27, 16:00-17:30 CST, Session Chair: Yan Lei)
Contextual-Semantic-Aware Linkable Knowledge Prediction in Stack Overflow via Self-Attention
Zhaolin Luo (Chongqing university), Ling Xu (Chongqing university), Zhou Xu (Chongqing university), Meng Yan (Chongqing university), Yan Lei (Chongqing university) and Can Li (Chongqing university)
An Empirical Study on Common Bugs in Deep Learning Compilers
Xiaoting Du (Beihang University), Zheng Zheng (Beihang University), Lei Ma (University of Alberta) and Jianjun Zhao (Kushu University)
Out-of-Distribution Detection through Relative Activation-Deactivation Abstractions
Zhen Zhang (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China), Peng Wu (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China), Yuhang Chen (Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, Beijing, China) and Jing Su (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China)
Session 6: Defect and Fault Prediction (Thu Oct 28, 14:00-15:30 CST, Session Chair: Zhou Xu)
Multi-source Cross Project Defect Prediction with Joint Wasserstein Distance and Ensemble Learning
Quanyi Zou (South China University of Technology), Lu Lu (South China University of Technology), Zhanyu Yang (South China University of Technology) and Hao Xu (South China University of Technology)
GCN2defect:Graph Convolutional Networks for SMOTETomek-based Software Defect Prediction
Cheng Zeng (School of Computer Science and Information Engineering, Hubei University), Chun Ying Zhou (School of Computer Science and Information Engineering, Hubei University), Sheng Kai Lv (School of Computer Science and Information Engineering, Hubei University), Peng He (School of Computer Science and Information Engineering, Hubei University) and Jie Huang (School of Computer Science and Technology, Guizhou University)
An Efficient Approximation for Quantitative Analysis of Dynamic Fault Trees
Luyao Ye (Wuhan University of Technology), Erqing Li (Wuhan University of Technology), Dongdong Zhao (Wuhan University of Technology), Shengwu Xiong (Wuhan University of Technology), Siwei Zhou (Wuhan University of Technology) and Jianwen Xiang (Wuhan University of Technology)
Session 7: Cloud Computing and Smart Contract (Thu Oct 28, 14:00-15:30 CST, Session Chair: Fuyang Li)
CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks
Shize Zhang (Tsinghua University), Yunfeng Zhao (Tsinghua University), Jianyuan Lu (Alibaba Group), Biao Lyu (Alibaba Group), Shunmin Zhu (Alibaba Group), Zhiliang Wang (Tsinghua University), Jiahai Yang (Tsinghua University), Lin He (Tsinghua University) and Jianping Wu (Tsinghua University)
Dependency-aware Form Understanding
Shaokun Zhang (Peking University), Yuanchun Li (Microsoft Research), Weixiang Yan (Beijing University of Posts and Telecommunications), Yao Guo (Peking University) and Xiangqun Chen (Peking University)
Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques
Hongjun Wu (National University of Defense Technology), Zhuo Zhang (Guilin University of Electronic Technology), Shangwen Wang (National University of Defense Technology), Yan Lei (Chongqing University), Bo Lin (National University of Defense Technology), Yihao Qin (National University of Defense Technology), Haoyu Zhang (Academy of Military Sciences) and Xiaoguang Mao (National University of Defense Technology)
Session 8: Code Maintainability and Testing (Thu Oct 28, 16:00-18:00 CST, Session Chair: Qi Xin)
One Step Further: Investigating Problematic Files of Architecture Anti-patterns
Jingwen Liu (Xi'an Jiaotong University), Wuxia Jin (Xi'an Jiaotong University), Qiong Feng (Nanjing University of Science and Technology), Xinyu Zhang (Xi'an Jiaotong University) and Yitong Dai (Xi'an Jiaotong University)
Simplify Array Processing Loops for Efficient Program Verification
Xiang Du (National University of Defense Technology), Liangze Yin (National University of Defense Technology) and Wei Dong (National University of Defense Technology)
Evaluating Natural Language Inference Models: A Metamorphic Testing Approach
Mingyue Jiang (Zhejiang Sci-Tech University), Houzhen Bao (Zhejiang Sci-Tech University), Kaiyi Tu (Zhejiang Sci-Tech University), Xiao-Yi Zhang (National Institute of Informatics) and Zuohua Ding (Zhejiang Sci-Tech University)
VALL-NUT: Principled Anti-Greybox-Fuzzing
Yuekang Li (Nanyang Technological University), Guozhu Meng (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences), Jun Xu (Stevens Institute of Technology), Cen Zhang (Nanyang Technological University), Hongxu Chen (Nanyang Technological University), Xiaofei Xie (Nanyang Technological University), Haijun Wang (Ant Finance) and Yang Liu (Nanyang Technological University)
Online
Notice: UTC: Coordinated Universal Time
Best Research Paper Nominees (Tue Oct 26, 13:45-14:30 UTC, Session Chair: Leonardo Mariani)
Tensfa: Detecting and Repairing Tensor Shape Faults in Deep Learning Systems
Dangwei Wu (Shanghai Jiao Tong University), Beijun Shen (Shanghai Jiao Tong University), Yuting Chen (Shanghai Jiao Tong University), He Jiang (Dalian University of Technology) and Lei Qiao (Beijing Institute of Control Engineering)
Expanding Fix Patterns to Enable Automatic Program Repair
Vesna Nowack (Queen Mary University of London), David Bowes (Lancaster University), Steve Counsell (Brunel University), Tracy Hall (Lancaster University), Saemundur Haraldsson (Stirling University), Emily Winter (Lancaster University) and John Woodward (Queen Mary University of London)
Lessons Learned from the Development of a Mechanical Ventilator for COVID-19
Andrea Bombarda (University of Bergamo), Silvia Bonfanti (University of Bergamo), Cristiano Galbiati (Princeton University), Angelo Gargantini (University of Bergamo), Patrizio Pelliccione (GSSI - Gran Sasso Science Institute), Elvinia Riccobene (Computer Science Dept., University of Milan), and Masayuki Wada (AstroCeNT, Nicolaus Copernicus Astronomical Center, Polish Academy of Sciences)
How Long Will it Take to Mitigate this Incident for Online Service Systems?
Weijing Wang (College of Intelligence and Computing, Tianjin University), Junjie Chen (College of Intelligence and Computing, Tianjin University), Lin Yang (Tianjin University), Hongyu Zhang (The University of Newcastle), Pu Zhao (Microsoft Research), Bo Qiao (Microsoft Research), Yu Kang (Microsoft Research), Qingwei Lin (Microsoft Research), Saravanakumar Rajmohan (Microsoft 365), Feng Gao (Microsoft Azure), Zhangwei Xu (Microsoft Azure), Yingnong Dang (Microsoft Azure) and Dongmei Zhang (Microsoft Research)
Session 1: Defect Prediction (Tue Oct 26, 15:30-16:00 UTC, Session Chair: Katerina Goseva-Popstojanova)
BEIRUT: Repository Mining for Defect Prediction
Amir Elmishali (Ben-Gurion University of the Negev), Bruno Sotto-Mayor (Ben-Gurion University of the Negev), Inbal Roshanski (Ben-Gurion University of the Negev), Amit Sultan (Ben-Gurion University of the Negev) and Meir Kalech (Ben-Gurion University of the Negev)
Multi-source Cross Project Defect Prediction with Joint Wasserstein Distance and Ensemble Learning
Quanyi Zou (South China University of Technology), Lu Lu (South China University of Technology), Zhanyu Yang (South China University of Technology) and Hao Xu (South China University of Technology)
GCN2defect:Graph Convolutional Networks for SMOTETomek-based Software Defect Prediction
Cheng Zeng (School of Computer Science and Information Engineering, Hubei University), Chun Ying Zhou (School of Computer Science and Information Engineering, Hubei University), Sheng Kai Lv (School of Computer Science and Information Engineering, Hubei University), Peng He (School of Computer Science and Information Engineering, Hubei University) and Jie Huang (School of Computer Science and Technology, Guizhou University)
Session 2: Anomaly Detection (Tue Oct 26, 16:15-16:45 UTC, Session Chair: Shenglin Zhang)
LogFlash: Real-time Streaming Anomaly Detection and Diagnosis from System Logs for Large-scale Software Systems
Tong Jia (Peking University), Yifan Wu (Peking University), Chuanjia Hou (Peking University) and Ying Li (Peking University)
Identifying Root-Cause Metrics for Incident Diagnosis in Online Service Systems
Canhua Wu (Tsinghua University), Nengwen Zhao (Tsinghua University), Lixin Wang (China Construction Bank), Xiaoqin Yang (China Construction Bank), Shining Li (China Construction Bank), Ming Zhang (China Construction Bank), Xing Jin (China Construction Bank), Xidao Wen (Tsinghua University), Xiaohui Nie (Tsinghua University), Wenchi Zhang (BizSeer), Kaixin Sui (BizSeer) and Dan Pei (Tsinghua University)
Robust KPI Anomaly Detection for Large-Scale Software Services with Partial Labels
Shenglin Zhang (Nankai University), Chenyu Zhao (Nankai University), Yicheng Sui (Nankai University), Ya Su (Tsinghua University), Yongqian Sun (Nankai University), Yuzhi Zhang (Nankai University), Dan Pei (Tsinghua University) and Yizhe Wang (Beijing Bohong Keyuan Information Technology Co. LTD)
Session 3: Deep Learning Applications (Tue Oct 26, 16:45-17:30 UTC, Session Chair: Artur Andrzejak)
Contextual-Semantic-Aware Linkable Knowledge Prediction in Stack Overflow via Self-Attention
Zhaolin Luo (Chongqing university), Ling Xu (Chongqing university), Zhou Xu (Chongqing university), Meng Yan (Chongqing university), Yan Lei (Chongqing university) and Can Li (Chongqing university)
Optimizing Selective Protection for CNN Resilience
Abdulrahman Mahmoud (University of Illinois at Urbana-Champaign and Harvard University), Siva Kumar Sastry Hari (NVIDIA Corporation), Christopher W. Fletcher (University of Illinois at Urbana-Champaign), Sarita V. Adve (University of Illinois at Urbana-Champaign), Charbel Sakr (University of Illinois at Urbana-Champaign), Naresh Shanbhag (University of Illinois at Urbana-Champaign), Pavlo Molchanov (NVIDIA), Michael B. Sullivan (NVIDIA), Timothy Tsai (NVIDIA) and Stephen W. Keckler (NVIDIA)
Dependency-aware Form Understanding
Shaokun Zhang (Peking University), Yuanchun Li (Microsoft Research), Weixiang Yan (Beijing University of Posts and Telecommunications), Yao Guo (Peking University) and Xiangqun Chen (Peking University)
Out-of-Distribution Detection through Relative Activation-Deactivation Abstractions
Zhen Zhang (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China), Peng Wu (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China), Yuhang Chen (Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, Beijing, China) and Jing Su (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China)
Session 4: Program Repair (Wed Oct 27, 13:45-14:30 UTC, Session Chair: Michael Lyu)
REFIXAR: Multi-version Reasoning for Automated Repair of Regression Errors
Xuan-Bach D. Le (The University of Melbourne) and Quang Loc Le (University College London)
Usability and Aesthetics: Better Together for Automated Repair of Web Pages
Thanh Le-Cong (Hanoi University of Science and Technology), Xuan Bach Le D. (Hanoi University of Science and Technology), Quyet Thang Huynh (Hanoi University of Science and Technology) and Phi Le Nguyen (Hanoi University of Science and Technology)
An Empirical Study on Common Bugs in Deep Learning Compilers
Xiaoting Du (Beihang University), Zheng Zheng (Beihang University), Lei Ma (University of Alberta) and Jianjun Zhao (Kushu University)
A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities
Eduard Pinconschi (INESC-ID, IST-ULisboa), Rui Abreu (INESC-ID, University of Porto) and Pedro Adão (IST-ULisboa and Instituto de Telecomunicações)
Session 5: Software Testing I (Wed Oct 27, 14:45-15:20 UTC, Session Chair: Nuno Antunes)
More Reliable Test Suites for Dynamic APR by using Counterexamples
Amirfarhad Nilizadeh (University of Central Florida), Marlon Calvo (University of Central Florida), Gary T. Leavens (University of Central Florida) and Xuan-Bach D. Le (The University of Melbourne)
Evaluating Natural Language Inference Models: A Metamorphic Testing Approach
Mingyue Jiang (Zhejiang Sci-Tech University), Houzhen Bao (Zhejiang Sci-Tech University), Kaiyi Tu (Zhejiang Sci-Tech University), Xiao-Yi Zhang (National Institute of Informatics) and Zuohua Ding (Zhejiang Sci-Tech University)
Black-Box and White-Box Test Case Generation for RESTful APIs: Enemies or Allies?
Alberto Martin-Lopez (SCORE Lab, I3US Institute, Universidad de Sevilla), Andrea Arcuri (Kristiania University College), Sergio Segura (SCORE Lab, I3US Institute, Universidad de Sevilla) and Antonio Ruiz-Cortés (SCORE Lab, I3US Institute, Universidad de Sevilla)
Session 6: Fault Analysis and Localization (Wed Oct 27, 15:20-16:00 UTC, Session Chair: Domenico Cotroneo)
An Efficient Approximation for Quantitative Analysis of Dynamic Fault Trees
Luyao Ye (Wuhan University of Technology), Erqing Li (Wuhan University of Technology), Dongdong Zhao (Wuhan University of Technology), Shengwu Xiong (Wuhan University of Technology), Siwei Zhou (Wuhan University of Technology) and Jianwen Xiang (Wuhan University of Technology)
Ahead of Time Mutation Based Fault Localisation using Statistical Inference
Jinhan Kim (Korea Advanced Institute of Science and Technology), Gabin An (Korea Advanced Institute of Science and Technology), Robert Feldt (Chalmers University of Technology) and Shin Yoo (Korea Advanced Institute of Science and Technology)
What to Blame? On the Granularity of Fault Localization for Deep Neural Networks
Matias Duran (University of Buenos Aires), Xiao-Yi Zhang (National Institute of Informatics), Paolo Arcaini (National Institute of Informatics) and Fuyuki Ishikawa (National Institute of Informatics)
A Novel Automatic Query Expansion with Word Embedding for IR-based Bug Localization
Misoo Kim (Sungkyunkwan University), Youngkyoung Kim (Sungkyunkwan University) and Eunseok Lee (Sungkyunkwan University)
Session 7:Software Testing II (Wed Oct 27, 16:15-16:45 UTC, Session Chair: Xiao-Yi Zhang)
VALL-NUT: Principled Anti-Greybox-Fuzzing
Yuekang Li (Nanyang Technological University), Guozhu Meng (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences), Jun Xu (Stevens Institute of Technology), Cen Zhang (Nanyang Technological University), Hongxu Chen (Nanyang Technological University), Xiaofei Xie (Nanyang Technological University), Haijun Wang (Ant Finance) and Yang Liu (Nanyang Technological University)
Fuzz Testing the Compiled Code in R Packages
Akhila Chowdary Kolla (Northern Arizona University), Alex Groce (Northern Arizona University) and Toby Dylan Hocking (Northern Arizona University)
Black-Box Testing of Deep Neural Networks
Taejoon Byun (University of Minnesota), Sanjai Rayadurgam (University of Minnesota) and Mats P.E. Heimdahl (University of Minnesota)
Session 8: Security and Safety (Wed Oct 27,16:45-17:30 UTC, Session Chair: Fabrizio Pastore)
EVIL: Exploiting Software via Natural Language
Pietro Liguori (University of Naples Federico II), Erfan Al-Hossami (University of North Carolina at Charlotte), Vittorio Orbinato (University of Naples Federico II), Roberto Natella (University of Naples Federico II), Samira Shaikh (University of North Carolina at Charlotte), Domenico Cotroneo (University of Naples Federico II) and Bojan Cukic (University of North Carolina at Charlotte)
Automatically Identifying Bug Reports with Tactical Vulnerabilities by Deep Feature Learning
Wei Zheng (College of Software and Microelectronics, Northwest Polytechnic University), Manqing Zhang (Northwestern Polytechnical University), Hui Tang (Northwestern Polytechnical University), Yuanfang Cai (Drexel University), Xiang Chen (Nantong University), Xiaoxue Wu (Yangzhou University) and Abubakar Omari Abdallah Semasaba (Northwestern Polytechnical University)
Eager Falsification For Accelerating Robustness Verification of Deep Neural Networks
Xingwu Guo (East China Normal University), Wenjie Wan (ByteDance Privacy and Security), Zhaodi Zhang (East China Normal University), Min Zhang (East China Normal University), Fu Song (School of Information Science and Technology, ShanghaiTech University) and Xuejun Wen (Huawei Technologies)
PyMTDEvaluator: A Tool for Time-Based Moving Target Defense Evaluation
Matheus Torquato (Federal Institute of Alagoas and University of Coimbra, CISUC, DEI), Paulo Maciel (Universidade Federal de Pernambuco) and Marco Vieira (University of Coimbra, CISUC, DEI)
Session 9:Cloud Computing and Smart Contract (Thu Oct 28, 13:00-13:45 UTC, Session Chair: Raul Barbosa)
CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks
Shize Zhang (Tsinghua University), Yunfeng Zhao (Tsinghua University), Jianyuan Lu (Alibaba Group), Biao Lyu (Alibaba Group), Shunmin Zhu (Alibaba Group), Zhiliang Wang (Tsinghua University), Jiahai Yang (Tsinghua University), Lin He (Tsinghua University) and Jianping Wu (Tsinghua University)
Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques
Hongjun Wu (National University of Defense Technology), Zhuo Zhang (Guilin University of Electronic Technology), Shangwen Wang (National University of Defense Technology), Yan Lei (Chongqing University), Bo Lin (National University of Defense Technology), Yihao Qin (National University of Defense Technology), Haoyu Zhang (Academy of Military Sciences) and Xiaoguang Mao (National University of Defense Technology)
Enhancing the Analysis of Software Failures in Cloud Computing Systems with Deep Learning (J1C2)
Domenico Cotroneo (Università degli Studi di Napoli Federico II), Luigi De Simone, Pietro Liguori (Università degli Studi di Napoli Federico II), Roberto Natella (Università degli Studi di Napoli Federico II)
Session 10: Program Analysis (Thu Oct 28, 13:45-14:30 UTC, Session Chair: Jurriaan Hage)
Static Bound Analysis of Dynamically Allocated Resources for C Programs
Guangsheng Fan (National University of Defense Technology), Taoqing Chen (National University of Defense Technology), Banghu Yin (National University of Defense Technology), Liqian Chen (National University of Defense Technology), Tengbin Wang (National University of Defense Technology) and Ji Wang (National University of Defense Technology)
Simplify Array Processing Loops for Efficient Program Verification
Xiang Du (National University of Defense Technology), Liangze Yin (National University of Defense Technology) and Wei Dong (National University of Defense Technology)
The Behavioral Diversity of Java JSON Libraries
Nicolas Harrand (KTH Royal Institute of Technology), Thomas Durieux (KTH Royal Institute of Technology), David Broman (KTH Royal Institute of Technology) and Benoit Baudry (KTH Royal Institute of Technology)
Static Type Inference for Foreign Functions of Python
Mingzhe Hu (University of Science and Technology of China), Yu Zhang (University of Science and Technology of China), Wenchao Huang (University of Science and Technology of China) and Yan Xiong (University of Science and Technology of China)
Session 11: Vulnerability and Security (Thu Oct 28, 14:45-15:20 UTC, Session Chair: Brahim HAMID)
Suraksha: A Framework to Analyze the Safety Implications of Perception Design Choices in AVs
Hengyu Zhao (University of California San Diego), Siva Kumar Sastry Hari (NVIDIA), Timothy Tsai (NVIDIA), Michael B. Sullivan (NVIDIA), Stephen W. Keckler (NVIDIA) and Jishen Zhao (University of California San Diego)
Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing
Yang Shi (Tongji University), Mianhong Li (Tongji University), Wujing Wei (Tongji University), Yangyang Liu (The Hong Kong Polytechnic University) and Xiapu Luo (The Hong Kong Polytechnic University)
VulSPG: Vulnerability detection based on slice property graph representation learning
Weining Zheng (Harbin Institute of Technology), Yuan Jiang (Harbin Institute of Technology) and Xiaohong Su (Harbin Institute of Technology)
PyGuard: Finding and Understanding Vulnerabilities in Python Virtual Machines
Chengman Jiang (University of Science and Technology of China), Baojian Hua (University of Science and Technology of China), Wanrong Ouyang (University of Science and Technology of China), Qiliang Fan (University of Science and Technology of China) and Zhizhong Pan (University of Science and Technology of China)
Session 12: Software Understanding (Thu Oct 28, 15:20-16:00 UTC, Session Chair: Keun Soo YIM)
iReview: An Intelligent Code Review Evaluation Tool using Biofeedback
Haytham Hijazi (CISUC, University of Coimbra), José Cruz (CISUC, University of Coimbra), João Castelhano (ICNAS, University of Coimbra), Ricardo Couceiro (CISUC, University of Coimbra), Miguel Castelo-Branco (ICNAS/CIBIT, University of Coimbra), Paulo de Carvalho (CISUC, University of Coimbra) and Henrique Madeira (CISUC, University of Coimbra)
Improving Code Summarization Through Automated Quality Assurance
Yuxing Hu (Chongqing University), Meng Yan (Chongqing University), Zhongxin Liu (Zhejiang University), Qiuyuan Chen (Zhejiang University) and Bei Wang (Chongqing University)
Characterizing Sensor Leaks in Android Apps
Xiaoyu Sun (Monash University), Xiao Chen (Monash University), Kui Liu (Nanjing University of Aeronautics and Astronautics), Sheng Wen (Swinburne University of Technology), Li Li (Monash University) and John Grundy (Monash University)
A Characteristic Study of Deadlocks in Database-Backed Web Applications
Zhengyi Qiu (North Carolina State University), Shudi Shao (North Carolina State University), Qi Zhao (North Carolina State University) and Guoliang Jin (North Carolina State University)
Session 13: Code Maintenance and Evolution (Thu Oct 28, 16:15-16:45 UTC, Session Chair: Shengjian Guo)
One Step Further: Investigating Problematic Files of Architecture Anti-patterns
Jingwen Liu (Xi'an Jiaotong University), Wuxia Jin (Xi'an Jiaotong University), Qiong Feng (Nanjing University of Science and Technology), Xinyu Zhang (Xi'an Jiaotong University) and Yitong Dai (Xi'an Jiaotong University)
Characterizing and Understanding Software Developer Networks in Security Development
Song Wang (York University) and Nachiappan Nagappan (Microsoft Research)
Fast Change-Based Alarm Reporting for Evolving Software Systems
Anushri Jana (TCS Research), Ankita Khadsare (TCS Research), Bharti Chimdyalwar (TCS Research), Shrawan Kumar (TCS Research), Vaidehi Ghime (TCS Research) and R.Venkatesh (TCS Research)
Session 14: Quality Assessment and Assurance (Thu Oct 28, 16:45-17:30 UTC, Session Chair: Peter Popov)
Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems
Guanping Xiao (Nanjing University of Aeronautics and Astronautics), Jun Liu (Nanjing University of Aeronautics and Astronautics), Zheng Zheng (Beihang University) and Yulei Sui (University of Technology Sydney)
Hawkeye: User-Guided Enumeration of Scenarios
Allison Sullivan (The University of Texas at Arlington)
Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps
Sen Chen (Tianjin University), Lingling Fan (Nankai University), Cuiyun Gao (Harbin Institute of Technology (Shenzhen)), Fu Song (ShanghaiTech University) and Yang Liu (Nanyang Technological University)
Supporting Deep Neural Network Safety Analysis and Retraining Through Heatmap-Based Unsupervised Learning (J1C2)
Hazem Fahmy (University of Luxembourg), Fabrizio Pastore (University of Luxembourg), Mojtaba Bagherzadeh (University of Ottawa) and Lionel Briand (University of Luxembourg)