AIware 2025
Wed 19 - Thu 20 November 2025
co-located with
ASE 2025
Toggle navigation
Attending
Attending: Registration
Venue: Grand Walkerhill Seoul
About Seoul
Accommodations
Transportation
Program
AIware Program
Your Program
Wed 19 Nov
Thu 20 Nov
Tracks
AIware 2025
Keynotes
Main Track
ArXiv Track
Benchmark & Dataset Track
Industry Demo Track
Organization
AIware 2025 Committees
Steering Committee
Organizing Committee
Track Committees
Main Track
ArXiv Track
Benchmark & Dataset Track
Contributors
People Index
Search
Series
Series
AIware 2025
AIware 2024
Sign in
Sign up
ASE 2025
(
series
) /
AIware 2025
(
series
) /
Grand Walkerhill Seoul
/
Room information: Grand Hall 5
Venue
Grand Walkerhill Seoul
Room name
Grand Hall 5
Floor
0
Room Information
No extra information available
Program
Detailed Table
Session Timeline
Detailed Timeline
This program is tentative and subject to change.
Program Display Configuration
Time Zone
The program is currently displayed in
(GMT+09:00) Seoul
.
Use conference time zone: (GMT+09:00) Seoul
Select other time zone
(GMT-12:00) AoE (Anywhere On Earth)
(GMT-11:00) Midway Island, Samoa
(GMT-10:00) Hawaii-Aleutian
(GMT-10:00) Hawaii
(GMT-09:30) Marquesas Islands
(GMT-09:00) Gambier Islands
(GMT-09:00) Alaska
(GMT-08:00) Tijuana, Baja California
(GMT-08:00) Pitcairn Islands
(GMT-08:00) Pacific Time (US & Canada)
(GMT-07:00) Mountain Time (US & Canada)
(GMT-06:00) Chihuahua, La Paz, Mazatlan
(GMT-07:00) Arizona
(GMT-06:00) Saskatchewan, Central America
(GMT-05:00) Guadalajara, Mexico City, Monterrey
(GMT-05:00) Easter Island
(GMT-06:00) Central Time (US & Canada)
(GMT-05:00) Eastern Time (US & Canada)
(GMT-05:00) Cuba
(GMT-05:00) Bogota, Lima, Quito, Rio Branco
(GMT-04:00) Caracas
(GMT-03:00) Santiago
(GMT-04:00) La Paz
(GMT-03:00) Faukland Islands
(GMT-04:00) Manaus, Amazonas, Brazil
(GMT-04:00) Atlantic Time (Goose Bay)
(GMT-04:00) Atlantic Time (Canada)
(GMT-03:30) Newfoundland
(GMT-03:00) UTC-3
(GMT-03:00) Montevideo
(GMT-03:00) Miquelon, St. Pierre
(GMT-03:00) Greenland
(GMT-03:00) Buenos Aires
(GMT-03:00) Brasilia, Distrito Federal, Brazil
(GMT-02:00) Mid-Atlantic
(GMT-01:00) Cape Verde Is.
(GMT-01:00) Azores
(UTC) Coordinated Universal Time
(GMT) Belfast
(GMT) Dublin
(GMT) Lisbon
(GMT) London
(GMT) Monrovia, Reykjavik
(GMT+01:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
(GMT+01:00) Belgrade, Bratislava, Budapest, Ljubljana, Prague
(GMT+01:00) Brussels, Copenhagen, Madrid, Paris
(GMT+01:00) West Central Africa
(GMT+02:00) Windhoek
(GMT+02:00) Athens
(GMT+02:00) Beirut
(GMT+02:00) Cairo
(GMT+02:00) Gaza
(GMT+02:00) Harare, Pretoria
(GMT+02:00) Jerusalem
(GMT+03:00) Minsk
(GMT+03:00) Syria
(GMT+03:00) Moscow, St. Petersburg, Volgograd
(GMT+03:00) Nairobi
(GMT+03:30) Tehran
(GMT+04:00) Abu Dhabi, Muscat
(GMT+04:00) Yerevan
(GMT+04:30) Kabul
(GMT+05:00) Ekaterinburg
(GMT+05:00) Tashkent
(GMT+05:30) Chennai, Kolkata, Mumbai, New Delhi
(GMT+05:45) Kathmandu
(GMT+06:00) Astana, Dhaka
(GMT+07:00) Novosibirsk
(GMT+06:30) Yangon (Rangoon)
(GMT+07:00) Bangkok, Hanoi, Jakarta
(GMT+07:00) Krasnoyarsk
(GMT+08:00) Beijing, Chongqing, Hong Kong, Urumqi
(GMT+08:00) Irkutsk, Ulaan Bataar
(GMT+08:00) Perth
(GMT+08:45) Eucla
(GMT+09:00) Osaka, Sapporo, Tokyo
(GMT+09:00) Seoul
(GMT+09:00) Yakutsk
(GMT+10:30) Adelaide
(GMT+09:30) Darwin
(GMT+10:00) Brisbane
(GMT+11:00) Hobart
(GMT+10:00) Vladivostok
(GMT+11:00) Lord Howe Island
(GMT+11:00) Solomon Is., New Caledonia
(GMT+11:00) Magadan
(GMT+12:00) Norfolk Island
(GMT+12:00) Anadyr, Kamchatka
(GMT+13:00) Auckland, Wellington
(GMT+12:00) Fiji, Kamchatka, Marshall Is.
(GMT+13:45) Chatham Islands
(GMT+13:00) Nuku'alofa
(GMT+14:00) Kiritimati
The GMT offsets shown reflect the offsets
at the moment of the conference
.
Time Band
By setting a time band, the program will dim events that are outside this time window. This is useful for (virtual) conferences with a continuous program (with repeated sessions).
The time band will also limit the events that are included in the personal iCalendar subscription service.
Display full program
Specify a time band
-
Save
×
You're viewing the program in a time zone which is different from your device's time zone
change time zone
Mon 17 Nov
Displayed time zone:
Seoul
change
11:00 - 12:30
Log & Dependency 1
ASE Research Papers
/
ASE Journal-First Track
at
Grand Hall 5
11:00
10m
Talk
LogMoE: Lightweight Expert Mixture for Cross-System Log Anomaly Detection
ASE Research Papers
Jiaxing Qi
Beihang University
,
Zhongzhi Luan
Beihang University
,
Shaohan Huang
Beihang University
,
Carol Fung
Concordia University
,
Yuchen Wang
Beihang University
,
Aibin Wang
Beihang University
,
Hongyu Zhang
Chongqing University
,
Hailong Yang
Beihang University, China
,
Depei Qian
Beihang University, China
11:10
10m
Talk
Improving LLM-based Log Parsing by Learning from Errors in Reasoning Traces
ASE Research Papers
Wang Jialai
National University of Singapore
,
Juncheng Lu
Southeast University
,
Jie Yang
Wuhan University
,
Junjie Wang
Institute of Software at Chinese Academy of Sciences
,
Zeyu Gao
Tsinghua University
,
Chao Zhang
Tsinghua University
,
Zhenkai Liang
NUS
,
Ee-Chien Chang
School of Computing, NUS
11:20
10m
Talk
LogUpdater: Automated Detection and Repair of Specific Defects in Logging Statements
ASE Journal-First Track
Renyi Zhong
The Chinese University of Hong Kong
,
Yichen LI
ByteDance
,
Jinxi Kuang
The Chinese University of Hong Kong
,
Wenwei Gu
The Chinese University of Hong Kong
,
Yintong Huo
Singapore Management University, Singapore
,
Michael Lyu
The Chinese University of Hong Kong
11:30
10m
Talk
LogAction: Consistent Cross-system Anomaly Detection through Logs via Active Domain Adaptation
ASE Research Papers
Chiming Duan
Peking University
,
Minghua He
Peking University
,
Pei Xiao
Peking University
,
Tong Jia
Institute for Artificial Intelligence, Peking University, Beijing, China
,
Xin Zhang
Peking University
,
Zhewei Zhong
Bytedance
,
Xiang Luo
Bytedance
,
Yan Niu
Bytedance
,
Lingzhe Zhang
Peking University, China
,
Yifan Wu
Peking University
,
Siyu Yu
The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen)
,
Weijie Hong
Peking university
,
Ying Li
School of Software and Microelectronics, Peking University, Beijing, China
,
Gang Huang
Peking University
11:40
10m
Talk
Defects4Log: Benchmarking LLMs for Logging Code Defect Detection and Reasoning
ASE Research Papers
Xin Wang
Changsha University of Science and Technology
,
Zhenhao Li
York University
,
Zishuo Ding
The Hong Kong University of Science and Technology (Guangzhou)
11:50
10m
Talk
Which Is Better For Reducing Outdated And Vulnerable Dependencies: Pinning Or Floating?
ASE Research Papers
Imranur Rahman
North Carolina State University
,
Jill Marley
North Carolina State University
,
William Enck
North Carolina State University
,
Laurie Williams
North Carolina State University
12:00
10m
Talk
On Automating Configuration Dependency Validation via Retrieval-Augmented Generation
ASE Research Papers
Sebastian Simon
Leipzig University
,
Alina Mailach
Leipzig University
,
Johannes Dorn
Leipzig University
,
Norbert Siegmund
Leipzig University
Pre-print
12:10
10m
Talk
CollaborLog: Efficient-Generalizable Log Anomaly Detection via Large-Small Model Collaboration in Software Evolution
ASE Research Papers
Pei Xiao
Peking University
,
Chiming Duan
Peking University
,
Minghua He
Peking University
,
Tong Jia
Institute for Artificial Intelligence, Peking University, Beijing, China
,
Yifan Wu
Peking University
,
Jing Xu
ByteDance
,
Gege Gao
ByteDance
,
Lingzhe Zhang
Peking University, China
,
Weijie Hong
Peking university
,
Ying Li
School of Software and Microelectronics, Peking University, Beijing, China
,
Gang Huang
Peking University
12:20
10m
Talk
On the Robustness Evaluation of 3D Obstacle Detection Against Specifications in Autonomous Driving
ASE Research Papers
Tri Minh-Triet Pham
Concordia University
,
Bo Yang
Concordia University
,
Jinqiu Yang
Concordia University
14:00 - 15:30
Software Process
ASE Research Papers
/
ASE Journal-First Track
at
Grand Hall 5
14:00
10m
Talk
LAURA: Enhancing Code Review Generation with Context-Enriched Retrieval-Augmented LLM
ASE Research Papers
Yuxin Zhang
Beijing Institute of Technology
,
Yuxia Zhang
Beijing Institute of Technology
,
Zeyu Sun
Institute of Software, Chinese Academy of Sciences
,
Yanjie Jiang
Peking University
,
Hui Liu
Beijing Institute of Technology
14:10
10m
Talk
AlertGuardian: Intelligent Alert Life-Cycle Management for Large-scale Cloud Systems
ASE Research Papers
Guangba Yu
The Chinese University of Hong Kong
,
Genting Mai
Sun Yat-sen University
,
Rui Wang
Tencent
,
Ruipeng Li
Tencent
,
Pengfei Chen
Sun Yat-sen University
,
Long Pan
Tencent
,
Ruijie Xu
Tencent
14:20
10m
Talk
SPICE : An Automated SWE-Bench Labeling Pipeline for Issue Clarity, Test Coverage, and Effort Estimation
ASE Research Papers
Aaditya Bhatia
Queen's University
,
Gustavo Oliva
Centre for Software Excellence, Huawei Canada
,
Gopi Krishnan Rajbahadur
Centre for Software Excellence, Huawei, Canada
,
Haoxiang Zhang
Huawei
,
Yihao Chen
Center for Software Excellence, Huawei Canada
,
Zhilong Chen
Center for Software Excellence, Huawei Canada
,
Arthur Leung
Center for Software Excellence, Huawei Canada
,
Dayi Lin
Centre for Software Excellence, Huawei Canada
,
Boyuan Chen
Centre for Software Excellence, Huawei Canada
,
Ahmed E. Hassan
Queen’s University
14:30
10m
Talk
Managing the variability of a logistics robotic system
ASE Journal-First Track
Kentaro Yoshimura
Hitachi, Ltd.
,
Yuta Yamauchi
Hitachi, Ltd.
,
Hideo Takahashi
Hitachi, Ltd.
14:40
10m
Talk
Sprint2Vec: A Deep Characterization of Sprints in Iterative Software Development
ASE Journal-First Track
Morakot Choetkiertikul
Mahidol University, Thailand
,
Peerachai Banyongrakkul
Mahidol University
,
Chaiyong Rakhitwetsagul
Mahidol University, Thailand
,
Suppawong Tuarob
Mahidol University
,
Hoa Khanh Dam
University of Wollongong
,
Thanwadee Sunetnanta
Mahidol University
14:50
10m
Talk
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes
ASE Journal-First Track
Kashumi Madampe
Monash University, Australia
,
Rashina Hoda
Monash University
,
John Grundy
Monash University
15:00
10m
Talk
Rechecking Recheck Requests in Continuous Integration: An Empirical Study of OpenStack
ASE Research Papers
Yelizaveta Brus
University of Waterloo
,
Rungroj Maipradit
University of Waterloo
,
Earl T. Barr
University College London
,
Shane McIntosh
University of Waterloo
15:10
10m
Talk
An LLM-based multi-agent framework for agile effort estimation
ASE Research Papers
Long Bui
University of Wollongong
,
Hoa Khanh Dam
University of Wollongong
,
Rashina Hoda
Monash University
15:20
10m
Talk
From Characters to Structure: Rethinking Real-Time Collaborative Programming Models
ASE Research Papers
Leon Freudenthaler
FH Campus Wien
,
Bernhard Taufner
FH Campus Wien
,
Karl M. Göschka
TU Wien
16:00 - 16:50
Quantum Software Engineering
ASE NIER Track
/
ASE Industry Showcase
at
Grand Hall 5
16:00
10m
Talk
Is Measurement Enough? Rethinking Output Validation in Quantum Program Testing
ASE NIER Track
Jiaming Ye
Southwest Jiaotong University
,
Xiongfei Wu
University of Luxembourg, Luxembourg
,
Shangzhou Xia
Kyushu University
,
Fuyuan Zhang
Kyushu University
,
Jianjun Zhao
Kyushu University
16:10
10m
Talk
Quantum Machine Learning-based Test Oracle for Autonomous Mobile Robots
ASE Industry Showcase
Xinyi Wang
Simula Research Laboratory; University of Oslo
,
Qinghua Xu
Lero Research Center&University of Limerick
,
Paolo Arcaini
National Institute of Informatics
,
Shaukat Ali
Simula Research Laboratory and Oslo Metropolitan University
,
Thomas Peyrucain
PAL Robotics
16:20
10m
Talk
NovaQ: Improving Quantum Program Testing through Diversity-Guided Test Case Generation
ASE NIER Track
TIANCHENG JIN
Kyushu University
,
Shangzhou Xia
Kyushu University
,
Jianjun Zhao
Kyushu University
16:30
10m
Talk
M2QCode: A Model-Driven Framework for Generating Multi-Platform Quantum Programs
ASE Industry Showcase
Xiaoyu Guo
Kyushu University
,
Shinobu Saito
NTT, Inc.
,
Jianjun Zhao
Kyushu University
16:40
10m
Talk
When Abstraction Breaks Physics: Rethinking Modular Design in Quantum Software
ASE NIER Track
Jianjun Zhao
Kyushu University
Tue 18 Nov
Displayed time zone:
Seoul
change
11:00 - 12:30
Security 1
ASE Research Papers
/
ASE Journal-First Track
at
Grand Hall 5
11:00
10m
Talk
Vulnerability-Affected Versions Identification: How Far Are We?
ASE Research Papers
Xingchu Chen
Institute of Information Engineering, CAS; School of Cyber Security, UCAS
,
Chengwei Liu
Nanyang Technological University
,
Jialun Cao
Hong Kong University of Science and Technology
,
Yang Xiao
Chinese Academy of Sciences
,
Xinyue Cai
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Yeting Li
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Jingyi Shi
Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences
,
tianqi sun
Institute of Information Engineering, Chinese Academy of Sciences
,
Haiming Chen
Institute of Software, Chinese Academy of Sciences
,
Wei Huo
Institute of Information Engineering at Chinese Academy of Sciences
11:10
10m
Talk
LOSVER: Line-Level Modifiability Signal-Guided Vulnerability Detection and Classification
ASE Research Papers
Doha Nam
Korea Advanced Institute of Science and Technology
,
Jongmoon Baik
Korea Advanced Institute of Science and Technology
11:20
10m
Talk
VERCATION: Precise Vulnerable Open-source Software Version Identification based on Static Analysis and LLM
ASE Journal-First Track
Yiran Cheng
Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;
,
Ting Zhang
Monash University
,
Lwin Khin Shar
Singapore Management University
,
Shouguo Yang
Zhongguancun Laboratory, Beijing, China
,
Chaopeng Dong
Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;
,
David Lo
Singapore Management University
,
Shichao Lv
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Zhiqiang Shi
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Limin Sun
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
11:30
10m
Talk
Not Every Patch is an Island: LLM-Enhanced Identification of Multiple Vulnerability Patches
ASE Research Papers
Yi Song
School of Computer Science, Wuhan University
,
Dongchen Xie
School of Cyber Science and Engineering, Wuhan University
,
Lin Xu
School of Cyber Science and Engineering, Wuhan University
,
He Zhang
School of Computer Science, Wuhan University
,
Chunying Zhou
School of Computer Science, Wuhan University
,
Xiaoyuan Xie
Wuhan University
11:40
10m
Talk
Vul-R2: A Reasoning LLM for Automated Vulnerability Repair
ASE Research Papers
Xin-Cheng Wen
Harbin Institute of Technology
,
Zirui Lin
Harbin Institute of Technology, Shenzhen
,
Yijun Yang
Tencent AI Lab
,
Cuiyun Gao
Harbin Institute of Technology, Shenzhen
,
Deheng Ye
Tencent AI Lab
11:50
10m
Talk
DeepExploitor: LLM-Enhanced Automated Exploitation of DeepLink Attack in Hybrid Apps
ASE Research Papers
Zhangyue Zhang
Fudan University
,
Lei Zhang
Fudan University
,
Zhibo Zhang
Huazhong University of Science and Technology
,
Yongheng Liu
Fudan University
,
Zhemin Yang
Fudan University
,
Yuan Zhang
Fudan University
,
Min Yang
Fudan University
12:00
10m
Talk
Demystifying Cookie Sharing Risks in WebView-based Mobile App-in-app Ecosystems
ASE Research Papers
Miao Zhang
Beijing University of Posts and Telecommunications
,
Shenao Wang
Huazhong University of Science and Technology
,
Guilin Zheng
Beijing University of Posts and Telecommunications
,
Yanjie Zhao
Huazhong University of Science and Technology
,
Haoyu Wang
Huazhong University of Science and Technology
12:10
10m
Talk
Hit The Bullseye On The First Shot: Improving LLMs Using Multi-Sample Self-Reward Feedback for Vulnerability Repair
ASE Research Papers
Rui Jiao
Xidian University
,
Yue Zhang
Drexel University
,
Jinku Li
Xidian University
,
Jianfeng Ma
Xidian University
12:20
10m
Talk
Propagation-Based Vulnerability Impact Assessment for Software Supply Chains
ASE Research Papers
Bonan Ruan
National University of Singapore
,
Zhiwei Lin
National University of Singapore
,
Jiahao Liu
National University of Singapore
,
Chuqi Zhang
National University of Singapore
,
Kaihang Ji
National University of Singapore
,
Zhenkai Liang
National University of Singapore
Pre-print
14:00 - 15:30
Security 2
ASE Journal-First Track
/
ASE Research Papers
at
Grand Hall 5
14:00
10m
Talk
Towards Generalizable Instruction Vulnerability Prediction via LLM-Enhanced Code Representation
ASE Research Papers
Bao Wen
Nanjing University of Aeronautics and Astronautics
,
Jingjing Gu
Nanjing University of Aeronautics and Astronautics
,
Jingxuan Zhang
Nanjing University of Aeronautics and Astronautics
,
Yang Liu
Nanyang Technological University
,
Pengfei Yu
Nanjing University of Aeronautics and Astronautics
,
Yanchao Zhao
Nanjing University of Aeronautics and Astronautics
14:10
10m
Talk
Interpretable Vulnerability Detection Reports
ASE Research Papers
Claudia Mamede
Carnegie Mellon University
,
Jose Campos
FEUP & LASIGE
,
Claire Le Goues
Carnegie Mellon University
,
Rui Abreu
Faculty of Engineering of the University of Porto, Portugal
14:20
10m
Talk
Security Debt in LLM Agent Applications: A Measurement Study of Vulnerabilities and Mitigation Trade-offs
ASE Research Papers
Zhuoxiang Shen
Fudan University
,
Jiarun Dai
Fudan University
,
Yuan Zhang
Fudan University
,
Min Yang
Fudan University
14:30
10m
Talk
Altered Histories in Version Control System Repositories: Evidence from the Trenches
ASE Research Papers
Solal Rapaport
Télécom Paris, Institut Polytechnique de Paris
,
Laurent Pautet
Télécom Paris, Institut Polytechnique de Paris
,
Samuel Tardieu
Télécom Paris, Institut Polytechnique de Paris
,
Stefano Zacchiroli
LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France
Pre-print
14:40
10m
Talk
Lares: LLM-driven Code Slice Semantic Search for Patch Presence Testing
ASE Research Papers
Siyuan Li
University of Chinese Academy of Sciences & Institute of Information Engineering Chinese Academy of Sciences, China
,
Yaowen Zheng
Institute of Information Engineering at Chinese Academy of Sciences
,
Hong Li
Institute of Information Engineering at Chinese Academy of Sciences
,
Jingdong Guo
Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;
,
Chaopeng Dong
Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;
,
Chunpeng Yan
Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China
,
Weijie Wang
Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China
,
Yimo Ren
Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China
,
Limin Sun
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Hongsong Zhu
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:50
10m
Talk
PoliCond: Condition-Aware Ontology-Driven LLMs for Privacy Policy Analysis
ASE Research Papers
Yalin Feng
Nanjing University
,
Yifei Lu
State Key Laboratory for Novel Software Technology, Nanjing University, China
,
Minxue Pan
Nanjing University
15:00
10m
Talk
Understanding Resource Injection Vulnerabilities in Kubernetes Ecosystems
ASE Research Papers
Defang Bo
Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences
,
Jie Lu
Institute of Computing Technology of the Chinese Academy of Sciences
,
Feng Li
Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China
,
Jingting Chen
Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences
,
Jinchen Wang
Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences
,
Chendong Yu
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Yeting Li
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Wei Huo
Institute of Information Engineering at Chinese Academy of Sciences
15:10
10m
Talk
LLM-Powered Static Binary Taint Analysis
ASE Journal-First Track
Puzhuo Liu
Ant Group & Tsinghua University
,
Chengnian Sun
University of Waterloo
,
Yaowen Zheng
Institute of Information Engineering at Chinese Academy of Sciences
,
Xuan Feng
Independent Researcher
,
Chuan Qin
Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences
,
Yuncheng Wang
Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, UCAS Beijing, China
,
Zhenyang Xu
University of Waterloo
,
Zhi Li
Institute of Information Engineering, Chinese Academy of Sciences, China
,
Peng Di
Ant Group & UNSW Sydney
,
Yu Jiang
Tsinghua university
,
Limin Sun
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
15:20
10m
Talk
Stealthy Backdoor Attack for Code Models
ASE Journal-First Track
Zhou Yang
University of Alberta, Alberta Machine Intelligence Institute
,
Bowen Xu
North Carolina State University
,
Jie M. Zhang
King's College London
,
Hong Jin Kang
University of Sydney
,
Jieke Shi
Singapore Management University
,
Junda He
Singapore Management University
,
David Lo
Singapore Management University
16:00 - 17:00
Maintenance & Evolution 2
ASE Industry Showcase
/
ASE NIER Track
at
Grand Hall 5
16:00
10m
Talk
An Empirical Study on UI Overlap in OpenHarmony Applications
ASE Industry Showcase
Farong Liu
Beihang University
,
Mingyi Zhou
Beihang University
,
Li Li
Beihang University
16:10
10m
Talk
Metrics Driven Reengineering and Continuous Code Improvement at Meta
ASE Industry Showcase
Audris Mockus
University of Tennessee
,
Peter C Rigby
Meta / Concordia University
,
Rui Abreu
Meta
,
Nachiappan Nagappan
Meta Platforms, Inc.
16:20
10m
Talk
Prompt-with-Me: in-IDE Structured Prompt Management for LLM-Driven Software Engineering
ASE Industry Showcase
Ziyou Li
Delft University of Technology
,
Agnia Sergeyuk
JetBrains Research
,
Maliheh Izadi
Delft University of Technology
16:30
10m
Talk
Are We SOLID Yet? An Empirical Study on Prompting LLMs to Detect Design Principle Violations
ASE NIER Track
Fatih Pehlivan
Bilkent University
,
Arçin Ülkü Ergüzen
Bilkent University
,
Sahand Moslemi Yengejeh
Bilkent University
,
Mayasah Lami
Bilkent University
,
Anil Koyuncu
Bilkent University
16:40
10m
Talk
Shrunk, Yet Complete: Code Shrinking-Resilient Android Third-Party Library Detection
ASE Industry Showcase
Jingkun Zhang
Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Jingzheng Wu
Institute of Software, The Chinese Academy of Sciences
,
Xiang Ling
Institute of Software, Chinese Academy of Sciences
,
Tianyue Luo
Institute of Software, Chinese Academy of Sciences
,
Bolin Zhou
Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Mutian Yang
Beijing ZhongKeWeiLan Technology Co.,Ltd.
16:50
10m
Talk
LLM-Guided Genetic Improvement: Envisioning Semantic Aware Automated Software Evolution
ASE NIER Track
Karine Even-Mendoza
King’s College London
,
Alexander E.I. Brownlee
University of Stirling
,
Alina Geiger
Johannes Gutenberg University Mainz
,
Carol Hanna
University College London
,
Justyna Petke
University College London
,
Federica Sarro
University College London
,
Dominik Sobania
Johannes Gutenberg-Universität Mainz
Wed 19 Nov
Displayed time zone:
Seoul
change
11:00 - 12:30
Security 4
ASE Research Papers
/
ASE Journal-First Track
at
Grand Hall 5
11:00
10m
Talk
When Does Wasm Malware Detection Fail? A Systematic Analysis of Their Robustness to Evasion
ASE Research Papers
Taeyoung Kim
Sungkyunkwan University
,
Sanghak Oh
Sungkyunkwan University
,
Kiho Lee
ETRI (Electronics and Telecommunications Research Institute), South Korea
,
Weihang Wang
University of Southern California
,
Yonghwi Kwon
University of Maryland
,
Sanghyun Hong
Oregon State University
,
Hyoungshick Kim
Sungkyunkwan University
11:10
10m
Talk
RFCAudit: AI Agent for Auditing Protocol Implementations Against RFC Specifications
ASE Research Papers
Mingwei Zheng
Purdue University
,
Chengpeng Wang
Purdue University
,
Xuwei Liu
Purdue University, USA
,
Jinyao Guo
Purdue University
,
Shiwei Feng
Purdue University
,
Xiangyu Zhang
Purdue University
11:20
10m
Talk
Time to separate from StackOverflow and match with ChatGPT for encryption
ASE Journal-First Track
Ehsan Firouzi
TU Clausthal
,
Mohammad Ghafari
TU Clausthal
11:30
10m
Talk
Demystifying Cross-Language C/C++ Binaries: A Robust Software Component Analysis Approach
ASE Research Papers
Meiqiu Xu
Northeastern University, China
,
Ying Wang
Northeastern University
,
Wei Tang
HUA WEI
,
Xian Zhan
HUA WEI
,
Shing-Chi Cheung
Hong Kong University of Science and Technology
,
Hai Yu
Northeastern University, China
,
Zhiliang Zhu
Northeastern University, China
11:40
10m
Talk
Detecting Various DeFi Price Manipulations with LLM Reasoning
ASE Research Papers
Juantao Zhong
Lingnan University
,
Daoyuan Wu
Lingnan University
,
Ye Liu
Singapore Management University
,
Maoyi Xie
Nanyang Technological University
,
Yang Liu
Nanyang Technological University
,
Yi Li
Nanyang Technological University
,
Ning Liu
City University of Hong Kong
11:50
10m
Talk
Uncovering Prompt Elements: Cloning System Prompts from Behavioral Traces
ASE Research Papers
Yi Qian
State Key Laboratory for Novel Software Technology, Nanjing University
,
Pengfei
State Key Laboratory for Novel Software Technology, Nanjing University
,
Hao Wu
,
Ligeng Chen
Honor Device Co., Ltd
,
Bing Mao
Nanjing University
12:00
10m
Talk
CRYPTBARA: Dependency-Guided Detection of Python Cryptographic API Misuses
ASE Research Papers
seogyeong cho
Korea University
,
Seungeun Yu
Korea University
,
Seunghoon Woo
Korea University
12:10
10m
Talk
A Large Scale Study of AI-based Binary Function Similarity Detection Techniques for Security Researchers and Practitioners
ASE Research Papers
Jingyi Shi
Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences
,
Yufeng Chen
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Yang Xiao
Chinese Academy of Sciences
,
Yuekang Li
UNSW
,
Zhengzi Xu
Imperial Global Singapore
,
Sihao Qiu
Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China
,
Chi Zhang
Institute of Information Engineering, CAS; School of Cyber Security, UCAS
,
Keyu Qi
Institute of Information Engineering, CAS; School of Cyber Security, UCAS
,
Yeting Li
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Xingchu Chen
Institute of Information Engineering, CAS; School of Cyber Security, UCAS
,
Yanyan Zou
Institute of Information Engineering, Chinese Academy of Sciences
,
Yang Liu
Nanyang Technological University
,
Wei Huo
Institute of Information Engineering at Chinese Academy of Sciences
12:20
10m
Talk
FirmProj: Detecting Firmware Leakage in IoT Update Processes via Companion App Analysis
ASE Research Papers
Wenzhi Li
Shandong University
,
Jialong Guo
Shandong University
,
Jiongyi Chen
National University of Defense Technology
,
Fan Li
Shandong University
,
Yujie Xing
Shandong University
,
Yanbo Xu
Shanghai Jiao Tong University
,
Shishuai Yang
Shandong University
,
Wenrui Diao
Shandong University
14:00 - 15:30
Security 5
ASE Research Papers
at
Grand Hall 5
14:00
10m
Talk
Advancing Binary Code Similarity Detection via Context-Content Fusion and LLM Verification
ASE Research Papers
Chaopeng Dong
Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;
,
Jingdong Guo
Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;
,
Shouguo Yang
Zhongguancun Laboratory, Beijing, China
,
Yi Li
Nanyang Technological University
,
Dongliang Fang
Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China
,
Yang Xiao
Chinese Academy of Sciences
,
Yongle Chen
Taiyuan University of Technology, China
,
Limin Sun
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:10
10m
Talk
ACTaint: Agent-Based Taint Analysis for Access Control Vulnerabilities in Smart Contracts
ASE Research Papers
Huarui Lin
Zhejiang University
,
Zhipeng Gao
Shanghai Institute for Advanced Study - Zhejiang University
,
Jiachi Chen
Sun Yat-sen University
,
Xiang Chen
Nantong University
,
Xiaohu Yang
Zhejiang University
,
Lingfeng Bao
Zhejiang University
14:20
10m
Talk
AMPLE: Fine-grained File Access Policies for Server Applications
ASE Research Papers
Seyedhamed Ghavamnia
Bloomberg
,
Julien Vanegue
Imperial College London; Bloomberg
14:30
10m
Talk
Mockingbird: Efficient Excessive Data Exposures Detection via Dynamic Code Instrumentation
ASE Research Papers
Chenxiao Xia
Beijing Institute of Technology
,
Jiazheng Sun
Fudan University
,
Jun Zheng
Beijing Institute of Technology
,
Yu-an Tan
Beijing Institute of Technology
,
Hongyi Su
Beijing Institute of Technology
14:40
10m
Talk
DrainCode: Stealthy Energy Consumption Attacks on Retrieval-Augmented Code Generation via Context Poisoning
ASE Research Papers
Jiadong Wu
School of Software Engineering, Sun Yat-sen University
,
Yanlin Wang
Sun Yat-sen University
,
Tianyue Jiang
Sun Yat-sen University
,
Mingwei Liu
Sun Yat-Sen University
,
Jiachi Chen
Sun Yat-sen University
,
Chong Wang
Nanyang Technological University
,
Ensheng Shi
Huawei
,
Xilin Liu
Huawei Cloud
,
Yuchi Ma
Huawei Cloud Computing Technologies
,
Hongyu Zhang
Chongqing University
,
Zibin Zheng
Sun Yat-sen University
14:50
10m
Talk
Finding Insecure State Dependency in DApps via Multi-Source Tracing and Semantic Enrichment
ASE Research Papers
Jingwen Zhang
School of Software Engineering, Sun Yat sen University
,
Yuhong Nan
Sun Yat-sen University
,
Wei Li
School of Software Engineering, Sun Yat sen University
,
Kaiwen Ning
Sun Yat-sen University
,
Zewei Lin
Sun Yat-sen University
,
Zitong Yao
School of Software Engineering, Sun Yat sen University
,
Yuming Feng
Peng Cheng Laboratory
,
Weizhe Zhang
Harbin Institute of Technology
,
Zibin Zheng
Sun Yat-sen University
15:00
10m
Talk
Better Safe than Sorry: Preventing Policy Violations through Predictive Root-Cause-Analysis for IoT Systems
ASE Research Papers
Michael Norris
Penn State University
,
Syed Rafiul Hussain
Pennsylvania State University
,
Gang (Gary) Tan
Pennsylvania State University
15:10
10m
Talk
Backdoors in Code Summarizers: How Bad Is It?
ASE Research Papers
Chenyu Wang
Singapore Management University
,
Zhou Yang
University of Alberta, Alberta Machine Intelligence Institute
,
Yaniv Harel
Tel Aviv University
,
David Lo
Singapore Management University
Pre-print
15:20
10m
Talk
ProfMal: Detecting Malicious NPM Packages by the Synergy between Static and Dynamic Analysis
ASE Research Papers
Yiheng Huang
Fudan University
,
Wen Zheng
Fudan University
,
Susheng Wu
Fudan University
,
Bihuan Chen
Fudan University
,
You Lu
Fudan University
,
Zhuotong Zhou
Fudan University
,
Yiheng Cao
Fudan University
,
Xiaoyu Li
Fudan University
,
Xin Peng
Fudan University
16:00 - 17:00
Security 7
ASE NIER Track
/
ASE Industry Showcase
at
Grand Hall 5
16:00
10m
Talk
RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps
ASE NIER Track
Tiezhu Sun
University of Luxembourg
,
Marco Alecci
University of Luxembourg
,
Yewei Song
University of Luxembourg
,
Xunzhu Tang
University of Luxembourg
,
Kisub Kim
DGIST
,
Jordan Samhi
University of Luxembourg, Luxembourg
,
Tegawendé F. Bissyandé
University of Luxembourg
,
Jacques Klein
University of Luxembourg
16:10
10m
Talk
Unlocking Reproducibility: Automating re-Build Process for Open-Source Software
ASE Industry Showcase
Behnaz Hassanshahi
Oracle
,
Trong Nhan Mai
Oracle Labs
,
Benjamin Selwyn-Smith
Oracle Labs
,
Nicholas Allen
Oracle
16:20
10m
Talk
JSidentify-V2: Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection
ASE Industry Showcase
Zhihao Li
Tencent Inc.
,
Chaozheng Wang
The Chinese University of Hong Kong
,
Li Zongjie
Hong Kong University of Science and Technology
,
Xinyong Peng
Tencent Inc.
,
Qun Xia
Tencent Inc.
,
Haochuan Lu
Tencent
,
Ting Xiong
Tencent Inc.
,
Shuzheng Gao
Chinese University of Hong Kong
,
Cuiyun Gao
Harbin Institute of Technology, Shenzhen
,
Shuai Wang
Hong Kong University of Science and Technology
,
Yuetang Deng
Tencent
,
Huafeng Ma
Tencent Inc.
16:30
10m
Talk
IDBFuzz: Web Storage DataBase Fuzzing with Controllable Semantics
ASE NIER Track
Jingyi Chen
Jiangsu University
,
Jinfu Chen
Jiangsu University
,
Saihua Cai
Jiangsu University
,
Shengran Wang
Jiangsu University
16:40
10m
Talk
SCOPE: Evaluating and Enhancing Permission Explanation Transparency in Mobile Apps
ASE Industry Showcase
Liu Wang
Beijing University of Posts and Telecommunications
,
Tianshu Zhou
Beijing University of Posts and Telecommunications
,
Haoyu Wang
Huazhong University of Science and Technology
,
Xiyuan Liu
Freshippo-Alibaba Group
,
Yi Wang
16:50
10m
Talk
ApkArmor: Low-Cost Lightweight Anti-Decompilation Techniques for Android Apps
ASE Industry Showcase
Jiayang Liu
Huazhong University of Science and Technology
,
Yanjie Zhao
Huazhong University of Science and Technology
,
Pengcheng Xia
Huazhong University of Science and Technology
,
Haoyu Wang
Huazhong University of Science and Technology
Sun 16 Nov
Displayed time zone:
Seoul
change
Room
8:00
30
9:00
30
10:00
30
11:00
30
12:00
30
13:00
30
14:00
30
15:00
30
16:00
30
17:00
30
Grand Hall 5
ASE Tutorials
ASE Tutorials
ASE Tutorials
ASE Tutorials
Mon 17 Nov
Displayed time zone:
Seoul
change
Room
11:00
30
12:00
30
13:00
30
14:00
30
15:00
30
16:00
30
Grand Hall 5
ASE Research Papers + ASE Journal-First Track
Log & Dependency 1
ASE Research Papers + ASE Journal-First Track
Software Process
ASE NIER Track + ASE Industry Showcase
Quantum Software Engineering
Tue 18 Nov
Displayed time zone:
Seoul
change
Room
11:00
30
12:00
30
13:00
30
14:00
30
15:00
30
16:00
30
Grand Hall 5
ASE Research Papers + ASE Journal-First Track
Security 1
ASE Journal-First Track + ASE Research Papers
Security 2
ASE Industry Showcase + ASE NIER Track
Maintenance & Evolution 2
Wed 19 Nov
Displayed time zone:
Seoul
change
Room
11:00
30
12:00
30
13:00
30
14:00
30
15:00
30
16:00
30
Grand Hall 5
ASE Research Papers + ASE Journal-First Track
Security 4
ASE Research Papers
Security 5
ASE NIER Track + ASE Industry Showcase
Security 7
Thu 20 Nov
Displayed time zone:
Seoul
change
Room
8:00
30
9:00
30
10:00
30
11:00
30
12:00
30
13:00
30
14:00
30
15:00
30
16:00
30
17:00
30
Grand Hall 5
ASE Tutorials
ASE Tutorials
ASE Tutorials
ASE Tutorials
Mon 17 Nov
Displayed time zone:
Seoul
change
Room
11:00
15
30
45
12:00
15
30
45
13:00
15
30
45
14:00
15
30
45
15:00
15
30
45
16:00
15
30
45
Grand Hall 5
ASE Research Papers
LogMoE: Lightweight Expert Mixture for Cross-System Log Anomaly Detection
11:00 - 11:10
ASE Research Papers
Improving LLM-based Log Parsing by Learning from Errors in Reasoning Traces
11:10 - 11:20
ASE Journal-First Track
LogUpdater: Automated Detection and Repair of Specific Defects in Loggi ...
11:20 - 11:30
ASE Research Papers
LogAction: Consistent Cross-system Anomaly Detection through Logs via A ...
11:30 - 11:40
ASE Research Papers
Defects4Log: Benchmarking LLMs for Logging Code Defect Detection and Re ...
11:40 - 11:50
ASE Research Papers
Which Is Better For Reducing Outdated And Vulnerable Dependencies: Pinn ...
11:50 - 12:00
ASE Research Papers
On Automating Configuration Dependency Validation via Retrieval-Augment ...
12:00 - 12:10
ASE Research Papers
CollaborLog: Efficient-Generalizable Log Anomaly Detection via Large-Sm ...
12:10 - 12:20
ASE Research Papers
On the Robustness Evaluation of 3D Obstacle Detection Against Specifica ...
12:20 - 12:30
ASE Research Papers
LAURA: Enhancing Code Review Generation with Context-Enriched Retrieval ...
14:00 - 14:10
ASE Research Papers
AlertGuardian: Intelligent Alert Life-Cycle Management for Large-scale ...
14:10 - 14:20
ASE Research Papers
SPICE : An Automated SWE-Bench Labeling Pipeline for Issue Clarity, Tes ...
14:20 - 14:30
ASE Journal-First Track
Managing the variability of a logistics robotic system
14:30 - 14:40
ASE Journal-First Track
Sprint2Vec: A Deep Characterization of Sprints in Iterative Software De ...
14:40 - 14:50
ASE Journal-First Track
Supporting Emotional Intelligence, Productivity and Team Goals while Ha ...
14:50 - 15:00
ASE Research Papers
Rechecking Recheck Requests in Continuous Integration: An Empirical Stu ...
15:00 - 15:10
ASE Research Papers
An LLM-based multi-agent framework for agile effort estimation
15:10 - 15:20
ASE Research Papers
From Characters to Structure: Rethinking Real-Time Collaborative Progra ...
15:20 - 15:30
ASE NIER Track
Is Measurement Enough? Rethinking Output Validation in Quantum Program ...
16:00 - 16:10
ASE Industry Showcase
Quantum Machine Learning-based Test Oracle for Autonomous Mobile Robots
16:10 - 16:20
ASE NIER Track
NovaQ: Improving Quantum Program Testing through Diversity-Guided Test ...
16:20 - 16:30
ASE Industry Showcase
M2QCode: A Model-Driven Framework for Generating Multi-Platform Quantum ...
16:30 - 16:40
ASE NIER Track
When Abstraction Breaks Physics: Rethinking Modular Design in Quantum S ...
16:40 - 16:50
Tue 18 Nov
Displayed time zone:
Seoul
change
Room
11:00
15
30
45
12:00
15
30
45
13:00
15
30
45
14:00
15
30
45
15:00
15
30
45
16:00
15
30
45
Grand Hall 5
ASE Research Papers
Vulnerability-Affected Versions Identification: How Far Are We?
11:00 - 11:10
ASE Research Papers
LOSVER: Line-Level Modifiability Signal-Guided Vulnerability Detection ...
11:10 - 11:20
ASE Journal-First Track
VERCATION: Precise Vulnerable Open-source Software Version Identificati ...
11:20 - 11:30
ASE Research Papers
Not Every Patch is an Island: LLM-Enhanced Identification of Multiple V ...
11:30 - 11:40
ASE Research Papers
Vul-R2: A Reasoning LLM for Automated Vulnerability Repair
11:40 - 11:50
ASE Research Papers
DeepExploitor: LLM-Enhanced Automated Exploitation of DeepLink Attack i ...
11:50 - 12:00
ASE Research Papers
Demystifying Cookie Sharing Risks in WebView-based Mobile App-in-app Ec ...
12:00 - 12:10
ASE Research Papers
Hit The Bullseye On The First Shot: Improving LLMs Using Multi-Sample S ...
12:10 - 12:20
ASE Research Papers
Propagation-Based Vulnerability Impact Assessment for Software Supply C ...
12:20 - 12:30
ASE Research Papers
Towards Generalizable Instruction Vulnerability Prediction via LLM-Enha ...
14:00 - 14:10
ASE Research Papers
Interpretable Vulnerability Detection Reports
14:10 - 14:20
ASE Research Papers
Security Debt in LLM Agent Applications: A Measurement Study of Vulnera ...
14:20 - 14:30
ASE Research Papers
Altered Histories in Version Control System Repositories: Evidence from ...
14:30 - 14:40
ASE Research Papers
Lares: LLM-driven Code Slice Semantic Search for Patch Presence Testing
14:40 - 14:50
ASE Research Papers
PoliCond: Condition-Aware Ontology-Driven LLMs for Privacy Policy Analysis
14:50 - 15:00
ASE Research Papers
Understanding Resource Injection Vulnerabilities in Kubernetes Ecosystems
15:00 - 15:10
ASE Journal-First Track
LLM-Powered Static Binary Taint Analysis
15:10 - 15:20
ASE Journal-First Track
Stealthy Backdoor Attack for Code Models
15:20 - 15:30
ASE Industry Showcase
An Empirical Study on UI Overlap in OpenHarmony Applications
16:00 - 16:10
ASE Industry Showcase
Metrics Driven Reengineering and Continuous Code Improvement at Meta
16:10 - 16:20
ASE Industry Showcase
Prompt-with-Me: in-IDE Structured Prompt Management for LLM-Driven Soft ...
16:20 - 16:30
ASE NIER Track
Are We SOLID Yet? An Empirical Study on Prompting LLMs to Detect Design ...
16:30 - 16:40
ASE Industry Showcase
Shrunk, Yet Complete: Code Shrinking-Resilient Android Third-Party Libr ...
16:40 - 16:50
ASE NIER Track
LLM-Guided Genetic Improvement: Envisioning Semantic Aware Automated So ...
16:50 - 17:00
Wed 19 Nov
Displayed time zone:
Seoul
change
Room
11:00
15
30
45
12:00
15
30
45
13:00
15
30
45
14:00
15
30
45
15:00
15
30
45
16:00
15
30
45
Grand Hall 5
ASE Research Papers
When Does Wasm Malware Detection Fail? A Systematic Analysis of Their R ...
11:00 - 11:10
ASE Research Papers
RFCAudit: AI Agent for Auditing Protocol Implementations Against RFC Sp ...
11:10 - 11:20
ASE Journal-First Track
Time to separate from StackOverflow and match with ChatGPT for encryption
11:20 - 11:30
ASE Research Papers
Demystifying Cross-Language C/C++ Binaries: A Robust Software Component ...
11:30 - 11:40
ASE Research Papers
Detecting Various DeFi Price Manipulations with LLM Reasoning
11:40 - 11:50
ASE Research Papers
Uncovering Prompt Elements: Cloning System Prompts from Behavioral Traces
11:50 - 12:00
ASE Research Papers
CRYPTBARA: Dependency-Guided Detection of Python Cryptographic API Misuses
12:00 - 12:10
ASE Research Papers
A Large Scale Study of AI-based Binary Function Similarity Detection Te ...
12:10 - 12:20
ASE Research Papers
FirmProj: Detecting Firmware Leakage in IoT Update Processes via Compan ...
12:20 - 12:30
ASE Research Papers
Advancing Binary Code Similarity Detection via Context-Content Fusion a ...
14:00 - 14:10
ASE Research Papers
ACTaint: Agent-Based Taint Analysis for Access Control Vulnerabilities ...
14:10 - 14:20
ASE Research Papers
AMPLE: Fine-grained File Access Policies for Server Applications
14:20 - 14:30
ASE Research Papers
Mockingbird: Efficient Excessive Data Exposures Detection via Dynamic C ...
14:30 - 14:40
ASE Research Papers
DrainCode: Stealthy Energy Consumption Attacks on Retrieval-Augmented C ...
14:40 - 14:50
ASE Research Papers
Finding Insecure State Dependency in DApps via Multi-Source Tracing and ...
14:50 - 15:00
ASE Research Papers
Better Safe than Sorry: Preventing Policy Violations through Predictive ...
15:00 - 15:10
ASE Research Papers
Backdoors in Code Summarizers: How Bad Is It?
15:10 - 15:20
ASE Research Papers
ProfMal: Detecting Malicious NPM Packages by the Synergy between Static ...
15:20 - 15:30
ASE NIER Track
RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in ...
16:00 - 16:10
ASE Industry Showcase
Unlocking Reproducibility: Automating re-Build Process for Open-Source ...
16:10 - 16:20
ASE Industry Showcase
JSidentify-V2: Dynamic Memory Fingerprinting for Mini-Game Plagiarism D ...
16:20 - 16:30
ASE NIER Track
IDBFuzz: Web Storage DataBase Fuzzing with Controllable Semantics
16:30 - 16:40
ASE Industry Showcase
SCOPE: Evaluating and Enhancing Permission Explanation Transparency in ...
16:40 - 16:50
ASE Industry Showcase
ApkArmor: Low-Cost Lightweight Anti-Decompilation Techniques for Androi ...
16:50 - 17:00
x
Tue 4 Nov 05:21