Powered by
Proceedings of the ACM on Programming Languages, Volume 10, Number OOPSLA1
Sponsors
Article: oopslaa26foreword-fm003-p
SymGPT: Auditing Smart Contracts via Combining Symbolic Execution with Large Language Models
Shihao Xia,
Mengting He,
Shuai Shao,
Tingting Yu,
Yiying Zhang,
Nobuko Yoshida, and
Linhai Song
(Pennsylvania State University, USA; University of Connecticut, USA; University of California at San Diego, USA; University of Oxford, UK; Institute of Computing Technology at Chinese Academy of Sciences, China)
Article Search
Article: oopslaa26main-p107-p
When Specifications Meet Reality: Uncovering API Inconsistencies in Ethereum Infrastructure
Jie Ma,
Ningyu He,
Jinwen Xi,
Mingzhe Xing,
Liangxin Liu,
Jiushenzi Luo,
Xiaopeng Fu,
Chiachih Wu,
Haoyu Wang,
Ying Gao, and
Yinliang Yue
(Beihang University, China; Zhongguancun Laboratory, China; Hong Kong Polytechnic University, Hong Kong; Beijing Institute of Technology, China; Amber Group, Hong Kong; Huazhong University of Science and Technology, China)
Article Search
Artifacts Available
Article: oopslaa26main-p122-p
Experimental Evaluation Methodology for the Era of No Steady Performance
Jaromír Antoch,
Walter Binder,
Lubomír Bulej,
François Farquet,
Vojtěch Horký,
Aleksandar Prokopec,
Andrea Rosà, and
Petr Tůma
(Charles University, Czech Republic; USI Lugano, Switzerland; Oracle Labs, Switzerland)
Article Search
Article: oopslaa26main-p193-p
EditFlow: Benchmarking and Optimizing Code Edit Recommendation Systems via Reconstruction of Developer Flows
Chenyan Liu,
Yun Lin,
Jiaxin Chang,
Jiawei Liu,
Binhang Qi,
Bo Jiang,
Zhiyong Huang, and
Jin Song Dong
(Shanghai Jiao Tong University, China; National University of Singapore, Singapore; Bytedance Network Technology, China)
Article Search
Info
Artifacts Available
Article: oopslaa26main-p268-p
Beyond Coverage: Automatic Test Suite Augmentation for Enhanced Effectiveness using Large Language Models
Zeyu Lu,
Peng Zhang,
Yuge Nie,
Yibiao Yang,
Yutian Tang,
Chun Yong Chong, and
Yuming Zhou
(Nanjing University, China; University of Glasgow, UK; Monash University Malaysia, Subang Jaya, Malaysia)
Article Search
Article: oopslaa26main-p275-p
Determining the Unreachable: Constraint-Guided Reachability Analysis for Dependency Vulnerabilities
Wenbu Feng,
Xiaohong Li,
Ruitao Feng,
Yao Zhang,
Yuekang Li,
Zhiping Zhou,
Yunqian Wang, and
Yuqing Li
(Tianjin University, China; Southern Cross University, Australia; UNSW Sydney, Australia)
Article Search
Article: oopslaa26main-p311-p
LLM-Powered Silent Bug Fuzzing in Deep Learning Libraries via Versatile and Controlled Bug Transfer
Kunpeng Zhang,
Dongwei Xiao,
Daoyuan Wu,
Shuai Wang,
Jiali Zhao,
Yuanyi Lin,
Tongtong Xu, and
Shaohua Wang
(Hong Kong University of Science and Technology, Hong Kong; Lingnan University, Hong Kong; Huawei, China; Central University of Finance and Economics, China)
Article Search
Article: oopslaa26main-p341-p
A Tale of 1001 LoC: Potential Runtime Error-Guided Specification Synthesis for Verifying Large-Scale Programs
Zhongyi Wang,
Tengjie Lin,
Mingshuai Chen,
Haokun Li,
Mingqi Yang,
Xiao Yi,
Shengchao Qin,
Yixing Luo,
Xiaofeng Li,
Bin Gu,
Liqiang Lu, and
Jianwei Yin
(Zhejiang University, China; Peking University, China; Chinese University of Hong Kong, China; Xidian University, China; Beijing Institute of Control Engineering, China)
Preprint
Artifacts Available
Article: oopslaa26main-p510-p
Reframing Paths as Logic: Semantic Segmentation for Vulnerability Detection
Zong Cao,
Yuqiang Sun,
Zhengzi Xu,
Kaixuan Li,
Yeqi Fu,
Yiran Zhang,
Ziqiao Kong, and
Yang Liu
(Imperial Global Singapore, Singapore; Nanyang Technological University, Singapore; National University of Singapore, Singapore)
Article Search
Article: oopslaa26main-p549-p
proc time: 18.03