ISSTA Conference
@issta_conf
Followers
2K
Following
120
Media
168
Statuses
463
The 34th edition of the ACM SIGSOFT International Symposium on Software Testing and Analysis
Trondheim, Norway
Joined September 2014
πΆ Do not miss the organ concert as part of the #ISSTA25 social event starting at 19:00 at the Nidaros Cathedral. https://t.co/eHya0kiG0t
0
0
0
Join our closing session for #ISSTA25 in the πCosmos Hall at 17:30.
2
0
1
Finishing the paper sessions of the second day at #ISSTA25 (16:00 - 17:30): π Smart Contracts 2 πCosmos 3B π Fuzzing and Search-Based Testing πCosmos 3C
0
0
0
Afternoon sessions at #ISSTA25 (14:00 - 15:30): π AI Testing πCosmos 3A π Binary Code Analysis and Optimization πCosmos 3B π Gamification, Specifications, and Code Reviews πCosmos 3C
0
0
0
Morning sessions at #ISSTA25 (11:00 - 12:30): π Smart Contracts 1 πCosmos 3A π Program Analysis 2 πCosmos 3B π LLM-based Testing 2 πCosmos 3C π Empirical Studies πCosmos Hall
0
0
0
π Most Influential Paper π Let's start the morning with our #ISSTA2025 MIP Talk! Zichao Qi, Fan Long, Sara Achour, and Martin Rinard "An Analysis of Patch Plausibility and Correctness for Generate-and-validate Patch Generation Systems" https://t.co/PkRLwuBrwJ π Cosmos Hall
dl.acm.org
2
0
3
π Distinguished Paper Award (9/9) π Dominik Frey, Ulf KargΓ©n, and Daniel Varro "Assessing Scene Generation Techniques for Testing COLREGS-Compliance of Autonomous Surface Vehicles" https://t.co/qbKYdSS9B3
dl.acm.org
Autonomous surface vehicles (ASVs) need to complete missions without posing risks to other maritime traffic. Safe traffic in open sea encounters is controlled by the International Regulations for...
0
0
0
π Distinguished Paper Award (8/9) π Siao Wang, Zhen Dong, Hui Li, Liwei Shen, Xin Peng, and Dongdong She "RouthSearch: Inferring PID Parameter Specification for Flight Control Program by Coordinate Search" https://t.co/vRN34Zw2GA
dl.acm.org
Flight control programs are widely used in unmanned aerial vehicles (UAVs) to manage and maintain UAVsβ flying behaviors dynamically. These flight control programs include a PID control module that...
1
0
0
π Distinguished Paper Award (7/9) π Yingwei Ma, Rongyu Cao, Yongchang Cao, Yue Zhang, Jue Chen, Yibo Liu, Yuchen Liu, Binhua Li, Fei Huang, and Yongbin Li "SWE-GPT: A Process-Centric Language Model for Automated Software Improvement" https://t.co/pDKTMeiasU
dl.acm.org
Large language models (LLMs) have demonstrated remarkable performance in code generation, significantly enhancing the coding efficiency of developers. Recent advancements in LLM-based agents have led...
1
1
1
π Distinguished Paper Award (6/9) π Zhiyong Wu, Jie Liang, Jingzhou Fu, Mingzhe Wang, and Yu Jiang "Hulk: Exploring Data-Sensitive Performance Anomalies in DBMSs via Data-Driven Analysis" https://t.co/8F76lRHPKf
dl.acm.org
Performance is crucial for database management systems (DBMSs), and they are always designed to handle ever-changing workloads efficiently. However, the complexity of the cost-based optimizer (CBO)...
1
0
0
π Distinguished Paper Award (5/9) π Zhilei Ren, Yitao Li, Xiaochen Li, Guanxiao Qi, Jifeng Xuan, He Jiang "Reinforcement Learning-based Fuzz Testing for the Gazebo Robotic Simulator" https://t.co/XnPc5vjSDr
dl.acm.org
Gazebo, being the most widely utilized simulator in robotics, plays a pivotal role in developing and testing robotic systems. Given its impact on the safety and reliability of robotic operations,...
1
0
0
π Distinguished Paper Award (4/9) π Lian Gao and Heng Yin "BinDSA: Efficient, Precise Binary-Level Pointer Analysis with Context-Sensitive Heap Reconstruction" https://t.co/1eUoGppXen
dl.acm.org
Pointer analysis serves as a fundamental component in the realm of binary code reverse engineering. It can be leveraged to reconstruct a binary program's call graph and can be further applied to...
1
0
0
π Distinguished Paper Award (3/9) π Qingchen Yu, Xin Liu, Qingguo Zhou, and Chunming Wu "Bridging the Gaps Between Graph Neural Networks and Data-Flow Analysis: The Closer, the Better" https://t.co/2C0vIXZaAi
dl.acm.org
Recent advances in applying deep neural networks to programming tasks have achieved remarkable success in practice, prompting interest in exploring how well these models can perform traditional...
1
0
1
π Distinguished Paper Award (2/9) π Niklas Risse, Jing Liu, and Marcel BΓΆhme "Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection" https://t.co/gDwWsuYxro
dl.acm.org
According to our survey of machine learning for vulnerability detection (ML4VD), 9 in every 10 papers published in the past five years define ML4VD as a function-level binary classification problem:...
1
0
2
π Distinguished Paper Award (1/9) π Lingxiao Tang, Jiakun Liu, Zhongxin Liu, Xiaohu Yang, and Lingfeng Bao "LLM4SZZ: Enhancing SZZ Algorithm with Context-Enhanced Assessment on Large Language Models" https://t.co/SRUMOJ1Ts5
dl.acm.org
The SZZ algorithm is the dominant technique for identifying bug-inducing commits and serves as a foundation for many software engineering studies, such as bug prediction and static code analysis,...
1
0
0