Damian Arellanes | Composition Machines: Programming Self-Organising Software Models for the Emergence of Sequential Program Spaces |
Daniel Engel, Freek Verbeek and Binoy Ravindran | On The Decidability Of Disassembling Binaries |
Filip Drobnjakovic, Pavle Subotic and Caterina Urban | An Abstract Interpretation-Based Data Leakage Static Analysis |
Hao Wen, Jinzhao Wu, Jianmin Jiang, Jianqing Li and Zhong Hong | Managing traceability for software life cycle processes |
Haoyu Guo, Xiaodong Zhang, Zhiwei Zhang and Yulong Shen | Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Characteristics on Program Slices |
Hongming Liu and Guoqiang Li | Empirically Scalable Invariant Generation Leveraging Divide-and-Conquer with Pruning |
Jiacheng Jiang, Cheng Wen and Shengchao Qin | CtxFuzz: Discovering Heap-based Memory Vulnerabilities Through Context Heap Operation Sequence Guided Fuzzing |
Jie Su, Liansai Deng, Cheng Wen, Shengchao Qin and Cong Tian | CFStra: Enhancing Configurable Program Analysis Through LLM-driven Strategy Selection Based on Code Features |
Jin Cui and Zhenhua Duan | An approach to improving reliability of parallel graph computation |
Jingjing Jiang, Mengfei Yang, Lei Qiao, Tingyu Wang, Zhi Ma, Shaofeng Li and Shenghui Zhu | An Adaptive Real-Time Garbage Collection Method Based on File Write Prediction |
Lihan Xie, Zhicheng Hui and Qinxiang Cao | A Natural Formalized Proof Language |
Kunpeng Jian, Yanyan Zou, Yeting Li, Jialun Cao, Menghao Li, Jian Sun, Jingyi Shi and Wei Huo | Fuzzing for Stateful Protocol Implementations: Are We There Yet? |
Mohammad Wahiduzzaman Khan and Sheng Chen | Gradual Typing Performance, Micro Configurations and Macro Perspectives |
Muhammad Naeem, Rong Gu, Cristina Seceleanu, Kim Guldstrand Larsen, Brian Nielsen and Michele Albano | Energy-Optimized Motion Planning for Autonomous Vehicles Using UPPAAL Stratego |
P. J. L. Cuijpers, Jonas Hansen and Kim G. Larsen | Safe and Infinite Resource Scheduling Using Energy Timed Automata |
Pengkun Jiang, Sinan Wang and Yepang Liu | Tree-Based Synthesis of Web Test Sequences From Manual Actions |
Renjue Li, Tianhang Qin and Cas Widdershoven | ISS-Scenario: Scenario-based Testing in CARLA |
Siqi Wang, Changwen Li, Tiantian Sun, Rongjie Yan and Jun Yan | Automatic construction of HD maps for simulation-based testing of autonomous driving systems |
Siyi Gu, Xiaoqiang Liu, Hui Guo, Bochun Cao, Baiyan Li, Lizhi Cai and Hu Yun | Finding Deep-hidden Bugs in Android Apps via Functional Semantics Guided Exploration |
Wenjian Chai, Rongjie Yan, Wenhui Zhang and Jian Zhang | Slicing assisted program verification: an empirical study |
Xin Zhou, Yisong Wang, Renyan Feng and Songhang Xu | Strong Forgetting in Hennessy-Milner Logic |
Xuezhou Tang | Improved Incremental Verification for Neural Networks |
Xuyang Li, Hongjin Liang and Xinyu Feng | Verified Validation for Affine Polyhedral Scheduling |
Yibo Dai, Peng Wu, Shecheng Cui and Linhai Ma | Intrathread Method Orders based Adaptive Testing of Concurrent Objects |
Yongjian Li, Hongjian Jiang and Yongxin Zhao | A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand Space |
Zongxin Liu, Pengfei Yang, Lijun Zhang and Xiaowei Huang | DeepCDCL: An CDCL-based Neural Network Verification Framework |