| Damian Arellanes | Composition Machines: Programming Self-Organising Software Models for the Emergence of Sequential Program Spaces |
| Daniel Engel, Freek Verbeek and Binoy Ravindran | On The Decidability Of Disassembling Binaries |
| Filip Drobnjakovic, Pavle Subotic and Caterina Urban | An Abstract Interpretation-Based Data Leakage Static Analysis |
| Hao Wen, Jinzhao Wu, Jianmin Jiang, Jianqing Li and Zhong Hong | Managing traceability for software life cycle processes |
| Haoyu Guo, Xiaodong Zhang, Zhiwei Zhang and Yulong Shen | Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Characteristics on Program Slices |
| Hongming Liu and Guoqiang Li | Empirically Scalable Invariant Generation Leveraging Divide-and-Conquer with Pruning |
| Jiacheng Jiang, Cheng Wen and Shengchao Qin | CtxFuzz: Discovering Heap-based Memory Vulnerabilities Through Context Heap Operation Sequence Guided Fuzzing |
| Jie Su, Liansai Deng, Cheng Wen, Shengchao Qin and Cong Tian | CFStra: Enhancing Configurable Program Analysis Through LLM-driven Strategy Selection Based on Code Features |
| Jin Cui and Zhenhua Duan | An approach to improving reliability of parallel graph computation |
| Jingjing Jiang, Mengfei Yang, Lei Qiao, Tingyu Wang, Zhi Ma, Shaofeng Li and Shenghui Zhu | An Adaptive Real-Time Garbage Collection Method Based on File Write Prediction |
| Lihan Xie, Zhicheng Hui and Qinxiang Cao | A Natural Formalized Proof Language |
| Kunpeng Jian, Yanyan Zou, Yeting Li, Jialun Cao, Menghao Li, Jian Sun, Jingyi Shi and Wei Huo | Fuzzing for Stateful Protocol Implementations: Are We There Yet? |
| Mohammad Wahiduzzaman Khan and Sheng Chen | Gradual Typing Performance, Micro Configurations and Macro Perspectives |
| Muhammad Naeem, Rong Gu, Cristina Seceleanu, Kim Guldstrand Larsen, Brian Nielsen and Michele Albano | Energy-Optimized Motion Planning for Autonomous Vehicles Using UPPAAL Stratego |
| P. J. L. Cuijpers, Jonas Hansen and Kim G. Larsen | Safe and Infinite Resource Scheduling Using Energy Timed Automata |
| Pengkun Jiang, Sinan Wang and Yepang Liu | Tree-Based Synthesis of Web Test Sequences From Manual Actions |
| Renjue Li, Tianhang Qin and Cas Widdershoven | ISS-Scenario: Scenario-based Testing in CARLA |
| Siqi Wang, Changwen Li, Tiantian Sun, Rongjie Yan and Jun Yan | Automatic construction of HD maps for simulation-based testing of autonomous driving systems |
| Siyi Gu, Xiaoqiang Liu, Hui Guo, Bochun Cao, Baiyan Li, Lizhi Cai and Hu Yun | Finding Deep-hidden Bugs in Android Apps via Functional Semantics Guided Exploration |
| Wenjian Chai, Rongjie Yan, Wenhui Zhang and Jian Zhang | Slicing assisted program verification: an empirical study |
| Xin Zhou, Yisong Wang, Renyan Feng and Songhang Xu | Strong Forgetting in Hennessy-Milner Logic |
| Xuezhou Tang | Improved Incremental Verification for Neural Networks |
| Xuyang Li, Hongjin Liang and Xinyu Feng | Verified Validation for Affine Polyhedral Scheduling |
| Yibo Dai, Peng Wu, Shecheng Cui and Linhai Ma | Intrathread Method Orders based Adaptive Testing of Concurrent Objects |
| Yongjian Li, Hongjian Jiang and Yongxin Zhao | A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand Space |
| Zongxin Liu, Pengfei Yang, Lijun Zhang and Xiaowei Huang | DeepCDCL: An CDCL-based Neural Network Verification Framework |