AIware 2025
Wed 19 - Thu 20 November 2025
co-located with ASE 2025
VenueGrand Walkerhill Seoul
Room nameGrand Hall 5
Floor0
Room InformationNo extra information available
Program

This program is tentative and subject to change.

You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 17 Nov

Displayed time zone: Seoul change

11:00 - 12:30
11:00
10m
Talk
LogMoE: Lightweight Expert Mixture for Cross-System Log Anomaly Detection
ASE Research Papers
Jiaxing Qi Beihang University, Zhongzhi Luan Beihang University, Shaohan Huang Beihang University, Carol Fung Concordia University, Yuchen Wang Beihang University, Aibin Wang Beihang University, Hongyu Zhang Chongqing University, Hailong Yang Beihang University, China, Depei Qian Beihang University, China
11:10
10m
Talk
Improving LLM-based Log Parsing by Learning from Errors in Reasoning Traces
ASE Research Papers
Wang Jialai National University of Singapore, Juncheng Lu Southeast University, Jie Yang Wuhan University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Zhenkai Liang NUS, Ee-Chien Chang School of Computing, NUS
11:20
10m
Talk
LogUpdater: Automated Detection and Repair of Specific Defects in Logging Statements
ASE Journal-First Track
Renyi Zhong The Chinese University of Hong Kong, Yichen LI ByteDance, Jinxi Kuang The Chinese University of Hong Kong, Wenwei Gu The Chinese University of Hong Kong, Yintong Huo Singapore Management University, Singapore, Michael Lyu The Chinese University of Hong Kong
11:30
10m
Talk
LogAction: Consistent Cross-system Anomaly Detection through Logs via Active Domain Adaptation
ASE Research Papers
Chiming Duan Peking University, Minghua He Peking University, Pei Xiao Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Xin Zhang Peking University, Zhewei Zhong Bytedance, Xiang Luo Bytedance, Yan Niu Bytedance, Lingzhe Zhang Peking University, China, Yifan Wu Peking University, Siyu Yu The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Weijie Hong Peking university, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University
11:40
10m
Talk
Defects4Log: Benchmarking LLMs for Logging Code Defect Detection and Reasoning
ASE Research Papers
Xin Wang Changsha University of Science and Technology, Zhenhao Li York University, Zishuo Ding The Hong Kong University of Science and Technology (Guangzhou)
11:50
10m
Talk
Which Is Better For Reducing Outdated And Vulnerable Dependencies: Pinning Or Floating?
ASE Research Papers
Imranur Rahman North Carolina State University, Jill Marley North Carolina State University, William Enck North Carolina State University, Laurie Williams North Carolina State University
12:00
10m
Talk
On Automating Configuration Dependency Validation via Retrieval-Augmented Generation
ASE Research Papers
Sebastian Simon Leipzig University, Alina Mailach Leipzig University, Johannes Dorn Leipzig University, Norbert Siegmund Leipzig University
Pre-print
12:10
10m
Talk
CollaborLog: Efficient-Generalizable Log Anomaly Detection via Large-Small Model Collaboration in Software Evolution
ASE Research Papers
Pei Xiao Peking University, Chiming Duan Peking University, Minghua He Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Yifan Wu Peking University, Jing Xu ByteDance, Gege Gao ByteDance, Lingzhe Zhang Peking University, China, Weijie Hong Peking university, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University
12:20
10m
Talk
On the Robustness Evaluation of 3D Obstacle Detection Against Specifications in Autonomous Driving
ASE Research Papers
Tri Minh-Triet Pham Concordia University, Bo Yang Concordia University, Jinqiu Yang Concordia University
14:00 - 15:30
14:00
10m
Talk
LAURA: Enhancing Code Review Generation with Context-Enriched Retrieval-Augmented LLM
ASE Research Papers
Yuxin Zhang Beijing Institute of Technology, Yuxia Zhang Beijing Institute of Technology, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Yanjie Jiang Peking University, Hui Liu Beijing Institute of Technology
14:10
10m
Talk
AlertGuardian: Intelligent Alert Life-Cycle Management for Large-scale Cloud Systems
ASE Research Papers
Guangba  Yu The Chinese University of Hong Kong, Genting Mai Sun Yat-sen University, Rui Wang Tencent, Ruipeng Li Tencent, Pengfei Chen Sun Yat-sen University, Long Pan Tencent, Ruijie Xu Tencent
14:20
10m
Talk
SPICE : An Automated SWE-Bench Labeling Pipeline for Issue Clarity, Test Coverage, and Effort Estimation
ASE Research Papers
Aaditya Bhatia Queen's University, Gustavo Oliva Centre for Software Excellence, Huawei Canada, Gopi Krishnan Rajbahadur Centre for Software Excellence, Huawei, Canada, Haoxiang Zhang Huawei, Yihao Chen Center for Software Excellence, Huawei Canada, Zhilong Chen Center for Software Excellence, Huawei Canada, Arthur Leung Center for Software Excellence, Huawei Canada, Dayi Lin Centre for Software Excellence, Huawei Canada, Boyuan Chen Centre for Software Excellence, Huawei Canada, Ahmed E. Hassan Queen’s University
14:30
10m
Talk
Managing the variability of a logistics robotic system
ASE Journal-First Track
Kentaro Yoshimura Hitachi, Ltd., Yuta Yamauchi Hitachi, Ltd., Hideo Takahashi Hitachi, Ltd.
14:40
10m
Talk
Sprint2Vec: A Deep Characterization of Sprints in Iterative Software Development
ASE Journal-First Track
Morakot Choetkiertikul Mahidol University, Thailand, Peerachai Banyongrakkul Mahidol University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Suppawong Tuarob Mahidol University, Hoa Khanh Dam University of Wollongong, Thanwadee Sunetnanta Mahidol University
14:50
10m
Talk
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes
ASE Journal-First Track
Kashumi Madampe Monash University, Australia, Rashina Hoda Monash University, John Grundy Monash University
15:00
10m
Talk
Rechecking Recheck Requests in Continuous Integration: An Empirical Study of OpenStack
ASE Research Papers
Yelizaveta Brus University of Waterloo, Rungroj Maipradit University of Waterloo, Earl T. Barr University College London, Shane McIntosh University of Waterloo
15:10
10m
Talk
An LLM-based multi-agent framework for agile effort estimation
ASE Research Papers
Long Bui University of Wollongong, Hoa Khanh Dam University of Wollongong, Rashina Hoda Monash University
15:20
10m
Talk
From Characters to Structure: Rethinking Real-Time Collaborative Programming Models
ASE Research Papers
Leon Freudenthaler FH Campus Wien, Bernhard Taufner FH Campus Wien, Karl M. Göschka TU Wien
16:00 - 16:50
Quantum Software EngineeringASE NIER Track / ASE Industry Showcase at Grand Hall 5
16:00
10m
Talk
Is Measurement Enough? Rethinking Output Validation in Quantum Program Testing
ASE NIER Track
Jiaming Ye Southwest Jiaotong University, Xiongfei Wu University of Luxembourg, Luxembourg, Shangzhou Xia Kyushu University, Fuyuan Zhang Kyushu University, Jianjun Zhao Kyushu University
16:10
10m
Talk
Quantum Machine Learning-based Test Oracle for Autonomous Mobile Robots
ASE Industry Showcase
Xinyi Wang Simula Research Laboratory; University of Oslo, Qinghua Xu Lero Research Center&University of Limerick, Paolo Arcaini National Institute of Informatics , Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Thomas Peyrucain PAL Robotics
16:20
10m
Talk
NovaQ: Improving Quantum Program Testing through Diversity-Guided Test Case Generation
ASE NIER Track
TIANCHENG JIN Kyushu University, Shangzhou Xia Kyushu University, Jianjun Zhao Kyushu University
16:30
10m
Talk
M2QCode: A Model-Driven Framework for Generating Multi-Platform Quantum Programs
ASE Industry Showcase
Xiaoyu Guo Kyushu University, Shinobu Saito NTT, Inc., Jianjun Zhao Kyushu University
16:40
10m
Talk
When Abstraction Breaks Physics: Rethinking Modular Design in Quantum Software
ASE NIER Track
Jianjun Zhao Kyushu University

Tue 18 Nov

Displayed time zone: Seoul change

11:00 - 12:30
11:00
10m
Talk
Vulnerability-Affected Versions Identification: How Far Are We?
ASE Research Papers
Xingchu Chen Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Chengwei Liu Nanyang Technological University, Jialun Cao Hong Kong University of Science and Technology, Yang Xiao Chinese Academy of Sciences, Xinyue Cai Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingyi Shi Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, tianqi sun Institute of Information Engineering, Chinese Academy of Sciences, Haiming Chen Institute of Software, Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences
11:10
10m
Talk
LOSVER: Line-Level Modifiability Signal-Guided Vulnerability Detection and Classification
ASE Research Papers
Doha Nam Korea Advanced Institute of Science and Technology, Jongmoon Baik Korea Advanced Institute of Science and Technology
11:20
10m
Talk
VERCATION: Precise Vulnerable Open-source Software Version Identification based on Static Analysis and LLM
ASE Journal-First Track
Yiran Cheng Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Ting Zhang Monash University, Lwin Khin Shar Singapore Management University, Shouguo Yang Zhongguancun Laboratory, Beijing, China, Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, David Lo Singapore Management University, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
11:30
10m
Talk
Not Every Patch is an Island: LLM-Enhanced Identification of Multiple Vulnerability Patches
ASE Research Papers
Yi Song School of Computer Science, Wuhan University, Dongchen Xie School of Cyber Science and Engineering, Wuhan University, Lin Xu School of Cyber Science and Engineering, Wuhan University, He Zhang School of Computer Science, Wuhan University, Chunying Zhou School of Computer Science, Wuhan University, Xiaoyuan Xie Wuhan University
11:40
10m
Talk
Vul-R2: A Reasoning LLM for Automated Vulnerability Repair
ASE Research Papers
Xin-Cheng Wen Harbin Institute of Technology, Zirui Lin Harbin Institute of Technology, Shenzhen, Yijun Yang Tencent AI Lab, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Deheng Ye Tencent AI Lab
11:50
10m
Talk
DeepExploitor: LLM-Enhanced Automated Exploitation of DeepLink Attack in Hybrid Apps
ASE Research Papers
Zhangyue Zhang Fudan University, Lei Zhang Fudan University, Zhibo Zhang Huazhong University of Science and Technology, Yongheng Liu Fudan University, Zhemin Yang Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
12:00
10m
Talk
Demystifying Cookie Sharing Risks in WebView-based Mobile App-in-app Ecosystems
ASE Research Papers
Miao Zhang Beijing University of Posts and Telecommunications, Shenao Wang Huazhong University of Science and Technology, Guilin Zheng Beijing University of Posts and Telecommunications, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
12:10
10m
Talk
Hit The Bullseye On The First Shot: Improving LLMs Using Multi-Sample Self-Reward Feedback for Vulnerability Repair
ASE Research Papers
Rui Jiao Xidian University, Yue Zhang Drexel University, Jinku Li Xidian University, Jianfeng Ma Xidian University
12:20
10m
Talk
Propagation-Based Vulnerability Impact Assessment for Software Supply Chains
ASE Research Papers
Bonan Ruan National University of Singapore, Zhiwei Lin National University of Singapore, Jiahao Liu National University of Singapore, Chuqi Zhang National University of Singapore, Kaihang Ji National University of Singapore, Zhenkai Liang National University of Singapore
Pre-print
14:00 - 15:30
14:00
10m
Talk
Towards Generalizable Instruction Vulnerability Prediction via LLM-Enhanced Code Representation
ASE Research Papers
Bao Wen Nanjing University of Aeronautics and Astronautics, Jingjing Gu Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Yang Liu Nanyang Technological University, Pengfei Yu Nanjing University of Aeronautics and Astronautics, Yanchao Zhao Nanjing University of Aeronautics and Astronautics
14:10
10m
Talk
Interpretable Vulnerability Detection Reports
ASE Research Papers
Claudia Mamede Carnegie Mellon University, Jose Campos FEUP & LASIGE, Claire Le Goues Carnegie Mellon University, Rui Abreu Faculty of Engineering of the University of Porto, Portugal
14:20
10m
Talk
Security Debt in LLM Agent Applications: A Measurement Study of Vulnerabilities and Mitigation Trade-offs
ASE Research Papers
Zhuoxiang Shen Fudan University, Jiarun Dai Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
14:30
10m
Talk
Altered Histories in Version Control System Repositories: Evidence from the Trenches
ASE Research Papers
Solal Rapaport Télécom Paris, Institut Polytechnique de Paris, Laurent Pautet Télécom Paris, Institut Polytechnique de Paris, Samuel Tardieu Télécom Paris, Institut Polytechnique de Paris, Stefano Zacchiroli LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France
Pre-print
14:40
10m
Talk
Lares: LLM-driven Code Slice Semantic Search for Patch Presence Testing
ASE Research Papers
Siyuan Li University of Chinese Academy of Sciences & Institute of Information Engineering Chinese Academy of Sciences, China, Yaowen Zheng Institute of Information Engineering at Chinese Academy of Sciences, Hong Li Institute of Information Engineering at Chinese Academy of Sciences, Jingdong Guo Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Chunpeng Yan Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Weijie Wang Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Yimo Ren Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Hongsong Zhu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:50
10m
Talk
PoliCond: Condition-Aware Ontology-Driven LLMs for Privacy Policy Analysis
ASE Research Papers
Yalin Feng Nanjing University, Yifei Lu State Key Laboratory for Novel Software Technology, Nanjing University, China, Minxue Pan Nanjing University
15:00
10m
Talk
Understanding Resource Injection Vulnerabilities in Kubernetes Ecosystems
ASE Research Papers
Defang Bo Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Jie Lu Institute of Computing Technology of the Chinese Academy of Sciences, Feng Li Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Jingting Chen Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Jinchen Wang Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences, Chendong Yu Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences
15:10
10m
Talk
LLM-Powered Static Binary Taint Analysis
ASE Journal-First Track
Puzhuo Liu Ant Group & Tsinghua University, Chengnian Sun University of Waterloo, Yaowen Zheng Institute of Information Engineering at Chinese Academy of Sciences, Xuan Feng Independent Researcher, Chuan Qin Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Yuncheng Wang Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, UCAS Beijing, China, Zhenyang Xu University of Waterloo, Zhi Li Institute of Information Engineering, Chinese Academy of Sciences, China, Peng Di Ant Group & UNSW Sydney, Yu Jiang Tsinghua university, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
15:20
10m
Talk
Stealthy Backdoor Attack for Code Models
ASE Journal-First Track
Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Bowen Xu North Carolina State University, Jie M. Zhang King's College London, Hong Jin Kang University of Sydney, Jieke Shi Singapore Management University, Junda He Singapore Management University, David Lo Singapore Management University
16:00 - 17:00
Maintenance & Evolution 2ASE Industry Showcase / ASE NIER Track at Grand Hall 5
16:00
10m
Talk
An Empirical Study on UI Overlap in OpenHarmony Applications
ASE Industry Showcase
Farong Liu Beihang University, Mingyi Zhou Beihang University, Li Li Beihang University
16:10
10m
Talk
Metrics Driven Reengineering and Continuous Code Improvement at Meta
ASE Industry Showcase
Audris Mockus University of Tennessee, Peter C Rigby Meta / Concordia University, Rui Abreu Meta, Nachiappan Nagappan Meta Platforms, Inc.
16:20
10m
Talk
Prompt-with-Me: in-IDE Structured Prompt Management for LLM-Driven Software Engineering
ASE Industry Showcase
Ziyou Li Delft University of Technology, Agnia Sergeyuk JetBrains Research, Maliheh Izadi Delft University of Technology
16:30
10m
Talk
Are We SOLID Yet? An Empirical Study on Prompting LLMs to Detect Design Principle Violations
ASE NIER Track
Fatih Pehlivan Bilkent University, Arçin Ülkü Ergüzen Bilkent University, Sahand Moslemi Yengejeh Bilkent University, Mayasah Lami Bilkent University, Anil Koyuncu Bilkent University
16:40
10m
Talk
Shrunk, Yet Complete: Code Shrinking-Resilient Android Third-Party Library Detection
ASE Industry Showcase
Jingkun Zhang Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Tianyue Luo Institute of Software, Chinese Academy of Sciences, Bolin Zhou Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mutian Yang Beijing ZhongKeWeiLan Technology Co.,Ltd.
16:50
10m
Talk
LLM-Guided Genetic Improvement: Envisioning Semantic Aware Automated Software Evolution
ASE NIER Track
Karine Even-Mendoza King’s College London, Alexander E.I. Brownlee University of Stirling, Alina Geiger Johannes Gutenberg University Mainz, Carol Hanna University College London, Justyna Petke University College London, Federica Sarro University College London, Dominik Sobania Johannes Gutenberg-Universität Mainz

Wed 19 Nov

Displayed time zone: Seoul change

11:00 - 12:30
11:00
10m
Talk
When Does Wasm Malware Detection Fail? A Systematic Analysis of Their Robustness to Evasion
ASE Research Papers
Taeyoung Kim Sungkyunkwan University, Sanghak Oh Sungkyunkwan University, Kiho Lee ETRI (Electronics and Telecommunications Research Institute), South Korea, Weihang Wang University of Southern California, Yonghwi Kwon University of Maryland, Sanghyun Hong Oregon State University, Hyoungshick Kim Sungkyunkwan University
11:10
10m
Talk
RFCAudit: AI Agent for Auditing Protocol Implementations Against RFC Specifications
ASE Research Papers
Mingwei Zheng Purdue University, Chengpeng Wang Purdue University, Xuwei Liu Purdue University, USA, Jinyao Guo Purdue University, Shiwei Feng Purdue University, Xiangyu Zhang Purdue University
11:20
10m
Talk
Time to separate from StackOverflow and match with ChatGPT for encryption
ASE Journal-First Track
Ehsan Firouzi TU Clausthal, Mohammad Ghafari TU Clausthal
11:30
10m
Talk
Demystifying Cross-Language C/C++ Binaries: A Robust Software Component Analysis Approach
ASE Research Papers
Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, Wei Tang HUA WEI, Xian Zhan HUA WEI, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China
11:40
10m
Talk
Detecting Various DeFi Price Manipulations with LLM Reasoning
ASE Research Papers
Juantao Zhong Lingnan University, Daoyuan Wu Lingnan University, Ye Liu Singapore Management University, Maoyi Xie Nanyang Technological University, Yang Liu Nanyang Technological University, Yi Li Nanyang Technological University, Ning Liu City University of Hong Kong
11:50
10m
Talk
Uncovering Prompt Elements: Cloning System Prompts from Behavioral Traces
ASE Research Papers
Yi Qian State Key Laboratory for Novel Software Technology, Nanjing University, Pengfei State Key Laboratory for Novel Software Technology, Nanjing University, Hao Wu , Ligeng Chen Honor Device Co., Ltd, Bing Mao Nanjing University
12:00
10m
Talk
CRYPTBARA: Dependency-Guided Detection of Python Cryptographic API Misuses
ASE Research Papers
seogyeong cho Korea University, Seungeun Yu Korea University, Seunghoon Woo Korea University
12:10
10m
Talk
A Large Scale Study of AI-based Binary Function Similarity Detection Techniques for Security Researchers and Practitioners
ASE Research Papers
Jingyi Shi Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Yufeng Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Xiao Chinese Academy of Sciences, Yuekang Li UNSW, Zhengzi Xu Imperial Global Singapore, Sihao Qiu Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Chi Zhang Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Keyu Qi Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xingchu Chen Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yanyan Zou Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences
12:20
10m
Talk
FirmProj: Detecting Firmware Leakage in IoT Update Processes via Companion App Analysis
ASE Research Papers
Wenzhi Li Shandong University, Jialong Guo Shandong University, Jiongyi Chen National University of Defense Technology, Fan Li Shandong University, Yujie Xing Shandong University, Yanbo Xu Shanghai Jiao Tong University, Shishuai Yang Shandong University, Wenrui Diao Shandong University
14:00 - 15:30
14:00
10m
Talk
Advancing Binary Code Similarity Detection via Context-Content Fusion and LLM Verification
ASE Research Papers
Chaopeng Dong Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Jingdong Guo Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;, Shouguo Yang Zhongguancun Laboratory, Beijing, China, Yi Li Nanyang Technological University, Dongliang Fang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China, Yang Xiao Chinese Academy of Sciences, Yongle Chen Taiyuan University of Technology, China, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:10
10m
Talk
ACTaint: Agent-Based Taint Analysis for Access Control Vulnerabilities in Smart Contracts
ASE Research Papers
Huarui Lin Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Jiachi Chen Sun Yat-sen University, Xiang Chen Nantong University, Xiaohu Yang Zhejiang University, Lingfeng Bao Zhejiang University
14:20
10m
Talk
AMPLE: Fine-grained File Access Policies for Server Applications
ASE Research Papers
Seyedhamed Ghavamnia Bloomberg, Julien Vanegue Imperial College London; Bloomberg
14:30
10m
Talk
Mockingbird: Efficient Excessive Data Exposures Detection via Dynamic Code Instrumentation
ASE Research Papers
Chenxiao Xia Beijing Institute of Technology, Jiazheng Sun Fudan University, Jun Zheng Beijing Institute of Technology, Yu-an Tan Beijing Institute of Technology, Hongyi Su Beijing Institute of Technology
14:40
10m
Talk
DrainCode: Stealthy Energy Consumption Attacks on Retrieval-Augmented Code Generation via Context Poisoning
ASE Research Papers
Jiadong Wu School of Software Engineering, Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Tianyue Jiang Sun Yat-sen University, Mingwei Liu Sun Yat-Sen University, Jiachi Chen Sun Yat-sen University, Chong Wang Nanyang Technological University, Ensheng Shi Huawei, Xilin Liu Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies, Hongyu Zhang Chongqing University, Zibin Zheng Sun Yat-sen University
14:50
10m
Talk
Finding Insecure State Dependency in DApps via Multi-Source Tracing and Semantic Enrichment
ASE Research Papers
Jingwen Zhang School of Software Engineering, Sun Yat sen University, Yuhong Nan Sun Yat-sen University, Wei Li School of Software Engineering, Sun Yat sen University, Kaiwen Ning Sun Yat-sen University, Zewei Lin Sun Yat-sen University, Zitong Yao School of Software Engineering, Sun Yat sen University, Yuming Feng Peng Cheng Laboratory, Weizhe Zhang Harbin Institute of Technology, Zibin Zheng Sun Yat-sen University
15:00
10m
Talk
Better Safe than Sorry: Preventing Policy Violations through Predictive Root-Cause-Analysis for IoT Systems
ASE Research Papers
Michael Norris Penn State University, Syed Rafiul Hussain Pennsylvania State University, Gang (Gary) Tan Pennsylvania State University
15:10
10m
Talk
Backdoors in Code Summarizers: How Bad Is It?
ASE Research Papers
Chenyu Wang Singapore Management University, Zhou Yang University of Alberta, Alberta Machine Intelligence Institute , Yaniv Harel Tel Aviv University, David Lo Singapore Management University
Pre-print
15:20
10m
Talk
ProfMal: Detecting Malicious NPM Packages by the Synergy between Static and Dynamic Analysis
ASE Research Papers
Yiheng Huang Fudan University, Wen Zheng Fudan University, Susheng Wu Fudan University, Bihuan Chen Fudan University, You Lu Fudan University, Zhuotong Zhou Fudan University, Yiheng Cao Fudan University, Xiaoyu Li Fudan University, Xin Peng Fudan University
16:00 - 17:00
16:00
10m
Talk
RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps
ASE NIER Track
Tiezhu Sun University of Luxembourg, Marco Alecci University of Luxembourg, Yewei Song University of Luxembourg, Xunzhu Tang University of Luxembourg, Kisub Kim DGIST, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
16:10
10m
Talk
Unlocking Reproducibility: Automating re-Build Process for Open-Source Software
ASE Industry Showcase
16:20
10m
Talk
JSidentify-V2: Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection
ASE Industry Showcase
Zhihao Li Tencent Inc., Chaozheng Wang The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Xinyong Peng Tencent Inc., Qun Xia Tencent Inc., Haochuan Lu Tencent, Ting Xiong Tencent Inc., Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Shuai Wang Hong Kong University of Science and Technology, Yuetang Deng Tencent, Huafeng Ma Tencent Inc.
16:30
10m
Talk
IDBFuzz: Web Storage DataBase Fuzzing with Controllable Semantics
ASE NIER Track
Jingyi Chen Jiangsu University, Jinfu Chen Jiangsu University, Saihua Cai Jiangsu University, Shengran Wang Jiangsu University
16:40
10m
Talk
SCOPE: Evaluating and Enhancing Permission Explanation Transparency in Mobile Apps
ASE Industry Showcase
Liu Wang Beijing University of Posts and Telecommunications, Tianshu Zhou Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, Xiyuan Liu Freshippo-Alibaba Group, Yi Wang
16:50
10m
Talk
ApkArmor: Low-Cost Lightweight Anti-Decompilation Techniques for Android Apps
ASE Industry Showcase
Jiayang Liu Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Pengcheng Xia Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology

Sun 16 Nov

Displayed time zone: Seoul change

Room8:00309:003010:003011:003012:003013:003014:003015:003016:003017:0030
Grand Hall 5

Thu 20 Nov

Displayed time zone: Seoul change

Room8:00309:003010:003011:003012:003013:003014:003015:003016:003017:0030
Grand Hall 5

Mon 17 Nov

Displayed time zone: Seoul change

Room11:0015304512:0015304513:0015304514:0015304515:0015304516:00153045
Grand Hall 5

Tue 18 Nov

Displayed time zone: Seoul change

Room11:0015304512:0015304513:0015304514:0015304515:0015304516:00153045
Grand Hall 5

Wed 19 Nov

Displayed time zone: Seoul change

Room11:0015304512:0015304513:0015304514:0015304515:0015304516:00153045
Grand Hall 5