Day 1 (July 29, 2024)Venue: (Street No.2 Meeting Room, 天街二号会议室) |
||
08:30-08:50 | Registration | |
08:50-09:00 | Opening Remarks | |
09:00-10:00 |
Keynote I Session Chair: Huibiao Zhu (East China Normal University) DSL Engineering via Lifting Transformation Zhenjiang Hu (Peking University) |
|
10:00-10:30 | Coffee Break | |
10:30-12:10 |
Session 1: Program Analysis and Testing I Session Chair: Yepang Liu (Southern University of Science and Technology) |
|
10:30-10:55 CFStra: Enhancing Configurable Program Analysis Through LLM-driven Strategy Selection Based on Code Features Jie Su, Liansai Deng, Cheng Wen, Shengchao Qin and Cong Tian |
||
10:55-11:20 Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Characteristics on Program Slices Haoyu Guo, Xiaodong Zhang, Zhiwei Zhang and Yulong Shen |
||
11:20-11:45 Finding Deep-hidden Bugs in Android Apps via Functional Semantics Guided Exploration Siyi Gu, Xiaoqiang Liu, Hui Guo, Bochun Cao, Baiyan Li, Lizhi Cai and Hu Yun |
||
11:45-12:10 CtxFuzz: Discovering Heap-based Memory Vulnerabilities Through Context Heap Operation Sequence Guided Fuzzing Jiacheng Jiang, Cheng Wen and Shengchao Qin |
||
12:10-14:00 | Lunch Break | |
14:00-15:15 |
Session 2: Formal Models Session Chair: Teng Long (China University of Geosciences) |
|
14:00-14:25 Composition Machines: Programming Self-Organising Software Models for the Emergence of Sequential Program Spaces Damian Arellanes |
||
14:25-14:50 Safe and Infinite Resource Scheduling Using Energy Timed Automata P. J. L. Cuijpers, Jonas Hansen and Kim G. Larsen |
||
14:50-15:15 Managing traceability for software life cycle processes Hao Wen, Jinzhao Wu, Jianmin Jiang, Jianqing Li and Zhong Hong |
||
15:15-15:45 | Coffee Break | |
15:45-17:25 |
Session 3: Formal Verification Session Chair: Lili Xiao (Donghua University) |
|
15:45-16:10 Improved Incremental Verification for Neural Networks Xuezhou Tang |
||
16:10-16:35 DeepCDCL: An CDCL-based Neural Network Verification Framework Zongxin Liu, Pengfei Yang, Lijun Zhang and Xiaowei Huang |
||
16:35-17:00 An approach to improving reliability of parallel graph computation Jin Cui and Zhenhua Duan |
||
17:00-17:25 Slicing assisted program verification: an empirical study Wenjian Chai, Rongjie Yan, Wenhui Zhang and Jian Zhang |
||
17:30-19:00 | Dinner | |
Day 2 (July 30, 2024)Venue: (Street No.2 Meeting Room, 天街二号会议室) |
||
09:00-10:00 |
Keynote II Session Chair: Wei-Ngan Chin (National University of Singapore) Protocol Conformance of Collaborative SPARQL using Multiparty Session Types Nobuko Yoshida (University of Oxford) |
|
10:00-10:30 | Coffee Break | |
10:30-12:10 |
Session 4: Program Analysis and Testing II Session Chair: Nobuko Yoshida (University of Oxford) |
|
10:30-10:55 An Abstract Interpretation-Based Data Leakage Static Analysis Filip Drobnjakovic, Pavle Subotic and Caterina Urban |
||
10:55-11:20 Tree-Based Synthesis of Web Test Sequences from Manual Actions Pengkun Jiang, Sinan Wang and Yepang Liu |
||
11:20-11:45 Intrathread Method Orders based Adaptive Testing of Concurrent Objects Yibo Dai, Peng Wu, Shecheng Cui and Linhai Ma |
||
11:45-12:10 Fuzzing for Stateful Protocol Implementations: Are We There Yet? Kunpeng Jian, Yanyan Zou, Yeting Li, Jialun Cao, Menghao Li, Jian Sun, Jingyi Shi and Wei Huo |
||
12:10-13:30 | Lunch Break | |
13:30-18:30 | Excursion | |
19:00 | Banquet | |
Day 3 (July 31, 2024)Venue: (Street No.2 Meeting Room, 天街二号会议室) |
||
8:30-10:05 |
Session 5: Formal Specification and Verification Session Chair: Caterina Urban (Inria & ENS) |
|
8:30-8:55 A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand Space Yongjian Li, Hongjian Jiang and Yongxin Zhao |
||
8:55-9:20 Verified Validation for Affine Polyhedral Scheduling Xuyang Li, Hongjin Liang and Xinyu Feng |
||
9:20-9:45 Empirically Scalable Invariant Generation Leveraging Divide-and-Conquer with Pruning Hongming Liu and Guoqiang Li |
||
9:45-10:05 Strong Forgetting in Hennessy-Milner Logic Xin Zhou, Yisong Wang, Renyan Feng and Songhang Xu |
||
10:05-10:35 | Coffee Break | |
10:35-12:10 |
Session 6: Software and Autonomous Systems Session Chair: Sheng Chen (University of Louisiana at Lafayette) |
|
10:35-11:00 An Adaptive Real-Time Garbage Collection Method Based on File Write Prediction Jingjing Jiang, Mengfei Yang, Lei Qiao, Tingyu Wang, Zhi Ma, Shaofeng Li and Shenghui Zhu |
||
11:00-11:25 Automatic construction of HD maps for simulation-based testing of autonomous driving systems Siqi Wang, Changwen Li, Tiantian Sun, Rongjie Yan and Jun Yan |
||
11:25-11:50 Energy-Optimized Motion Planning for Autonomous Vehicles Using UPPAAL Stratego Muhammad Naeem, Rong Gu, Cristina Seceleanu, Kim Guldstrand Larsen, Brian Nielsen and Michele Albano |
||
11:50-12:10 ISS-Scenario: Scenario-based Testing in CARLA Renjue Li, Tianhang Qin and Cas Widdershoven |
||
12:10-14:00 | Lunch Break | |
14:00-15:15 |
Session 7: Type System and Theorem Proving Session Chair: Zhiwu Xu (Shenzhen University) |
|
14:00-14:25 Gradual Typing Performance, Micro Configurations and Macro Perspectives Mohammad Wahiduzzaman Khan and Sheng Chen |
||
14:25-14:50 A Natural Formalized Proof Language Lihan Xie, Zhicheng Hui and Qinxiang Cao |
||
14:50-15:15 On the Decidability of Disassembling Binaries Daniel Engel, Freek Verbeek and Binoy Ravindran |
||
15:15-15:25 | Closing Remarks |