Powered by
Proceedings of the ACM on Software Engineering, Volume 2, Number FSE,
June 23–27, 2025,
Trondheim, Norway
Frontmatter
Papers
On-Demand Scenario Generation for Testing Automated Driving Systems
Songyang Yan,
Xiaodong Zhang,
Kunkun Hao,
Haojie Xin,
Yonggang Luo,
Jucheng Yang,
Ming Fan,
Chao Yang,
Jun Sun, and
Zijiang Yang
(Xi'an Jiaotong University, China; Xidian University, China; Synkrotron, China; Chongqing Changan Automobile, China; Singapore Management University, Singapore; University of Science and Technology of China, China)
Article Search
Info
Smart Contract Fuzzing Towards Profitable Vulnerabilities
Ziqiao Kong,
Cen Zhang,
Maoyi Xie,
Ming Hu,
Yue Xue,
Ye Liu,
Haijun Wang, and
Yang Liu
(Nanyang Technological University, Singapore; Singapore Management University, Singapore; MetaTrust Labs, Singapore; Xi'an Jiaotong University, China)
Preprint
Info
Artifacts Available
Code Change Intention, Development Artifact and History Vulnerability: Putting Them Together for Vulnerability Fix Detection by LLM
Xu Yang,
Wenhan Zhu,
Michael Pacheco,
Jiayuan Zhou,
Shaowei Wang,
Xing Hu, and
Kui Liu
(University of Manitoba, Canada; Huawei, Canada; Zhejiang University, China; Huawei Software Engineering Application Technology Lab, China)
Article Search
Automated Soap Opera Testing Directed by LLMs and Scenario Knowledge: Feasibility, Challenges, and Road Ahead
Yanqi Su,
Zhenchang Xing,
Chong Wang,
Chunyang Chen,
Sherry (Xiwei) Xu,
Qinghua Lu, and
Liming Zhu
(Australian National University, Australia; CSIRO's Data61, Australia; Nanyang Technological University, Singapore; TU Munich, Germany; CSIRO, Australia; UNSW, Australia)
Article Search
Automated and Accurate Token Transfer Identification and Its Applications in Cryptocurrency Security
Shuwei Song,
Ting Chen,
Ao Qiao,
Xiapu Luo,
Leqing Wang,
Zheyuan He,
Ting Wang,
Xiaodong Lin,
Peng He,
Wensheng Zhang, and
Xiaosong Zhang
(University of Electronic Science and Technology of China, China; Hong Kong Polytechnic University, China; Stony Brook University, USA; University of Guelph, Canada)
Article Search
Mitigating Emergent Malware Label Noise in DNN-Based Android Malware Detection
Haodong Li,
Xiao Cheng,
Guohan Zhang,
Guosheng Xu,
Guoai Xu, and
Haoyu Wang
(Beijing University of Posts and Telecommunications, China; UNSW, Australia; Harbin Institute of Technology, Shenzhen, China; Huazhong University of Science and Technology, China)
Article Search
Clone Detection for Smart Contracts: How Far Are We?
Zuobin Wang,
Zhiyuan Wan,
Yujing Chen,
Yun Zhang,
David Lo,
Difan Xie, and
Xiaohu Yang
(Zhejiang University, China; Hangzhou High-Tech Zone (Binjiang), China; Hangzhou City University, China; Singapore Management University, Singapore)
Article Search
Eliminating Backdoors in Neural Code Models for Secure Code Understanding
Weisong Sun,
Yuchen Chen,
Chunrong Fang,
Yebo Feng,
Yuan Xiao,
An Guo,
Quanjun Zhang,
Zhenyu Chen,
Baowen Xu, and
Yang Liu
(Nanjing University, Singapore; Nanjing University, China; Nanyang Technological University, Singapore)
Article Search
Understanding Debugging as Episodes: A Case Study on Performance Bugs in Configurable Software Systems
Max Weber,
Alina Mailach,
Sven Apel,
Janet Siegmund,
Raimund Dachselt, and
Norbert Siegmund
(Leipzig University, Germany; ScaDS.AI Dresden-Leipzig, Germany; Saarland Informatics Campus, Germany; Saarland University, Germany; Chemnitz University of Technology, Germany; Dresden University of Technology, Germany)
Article Search
Why the Proof Fails in Different Versions of Theorem Provers: An Empirical Study of Compatibility Issues in Isabelle
Xiaokun Luan,
David Sanan,
Zhe Hou,
Qiyuan Xu,
Liu Chengwei,
Yufan Cai,
Yang Liu, and
Meng Sun
(Peking University, China; Singapore Institute of Technology, Singapore; Griffith University, Australia; Nanyang Technological University, Singapore; China-Singapore International Joint Research Institute, China; National University of Singapore, Singapore)
Article Search
proc time: 0.14