


default search action
15th Internetware 2025: Trondheim, Norway
- Hong Mei, Jian Lv, Zhi Jin, Xuandong Li, Thomas Zimmermann, Ge Li, Lei Bu, Xin Xia:

Proceedings of the 16th International Conference on Internetware, Internetware 2025, Trondheim, Norway, June 20-22, 2025. ACM 2025, ISBN 979-8-4007-1926-4
Session 1: Software Vulnerability and Security I
- Hongcheng Fan

, Di Liu
, Jielun Wu
, Yang Feng
, Qingkai Shi
, Baowen Xu
:
Towards understanding the security issues of Python programs. 1-12 - Tian Hu

, Shangyuan Zhuang
, Zhaorui Guo
, Jiyan Sun, Yinlong Liu
, Wei Ma
, Hongchao Wang
, Lingfeng Zhao
, Xiaojie Zhang
:
A Novel LLM Approach of Cybersecurity Threat Analysis and Response. 13-23 - Guozhu Meng

, Zhixiu Guo
, Xiaodong Zhang
, Haoyu Wang
, Kai Chen
, Yang Liu
:
Measuring and Explaining the Effects of Android App Transformations in Online Malware Detection. 24-35 - Jun Ma

, Weixiang Huang
, Chun Cao
:
Leveraging Visible Widget Sizes for Detecting Repackaged Android Apps. 36-46
Session 2: AI for Software Engineering I
- Feng Ling

, Guoheng Huang
, Jingchao Wang
, Xiaochen Yuan
, Xuhang Chen
, XueYong Zhang
, Fanlong Zhang
, Chi-Man Pun
:
Code Retrieval with Mixture of Experts Prototype Learning Based on Classification. 47-58 - Yanzhen Zou

, Xianlin Zhao
, Xinglu Pan
, Bing Xie
:
Issue Retrieval and Verification Enhanced Supplementary Code Comment Generation. 59-70 - Jialun Cao

, Songqiang Chen
, Wuqi Zhang
, Hau Ching Lo
, Yeting Li
, Shing-Chi Cheung
:
CodeCleaner: Mitigating Data Contamination for LLM Benchmarking. 71-83 - Hao Gao

, Jingyue Wang
, Wenyang Fang
, Jingwei Xu
, Yunpeng Huang
, Taolue Chen
, Xiaoxing Ma
:
LASER: Script Execution by Autonomous Agents for On-demand Traffic Simulation. 84-95 - Yixuan Cao

, Yuhong Feng
, Huafeng Li
, Chongyi Huang
, Fangcao Jian
, Haoran Li
, Xu Wang
:
Tech-ASan: Two-stage check for Address Sanitizer. 96-107
Session 3: Software Testing and Quality Assurance
- Han Luo

, Yixuan Tang
, Jingxuan Zhang
, Xuanyan Zhu
, Jiayi Li
, Weiqin Zou
:
SRLRF: Fine-Grained Root Cause Analysis and Prediction for Compiler Optimization Defects. 108-118 - Chenliang Xing

, Gong Chen
, Qi Xin
, Xiaoyuan Xie
:
Revisit the Intuition of Mutation-Based Fault Localization in Real-world Programs. 119-129 - Kelin Zhu

, Yu Wang
, Linzhang Wang
, Xuandong Li
:
Emerging Compiler Testing Based on Test Case Reuse. 130-141 - Lina Gong

, Chen Wang
, Di Cui
, Yujun Huang
, Mingqiang Wei
:
UITrans: Seamless UI Translation from Android to HarmonyOS. 142-146 - Yang Hua

, Hongbin Xiao
, Wenhao Wang
, Zhi Li
:
XR4PD: Augmented Reality for Visualising Problem Diagrams in Requirements Analysis. 147-151 - Jingling Wang

, Shuwei Qiu
, Peng Wang
, Jiyuan Song
, Huayao Wu
, Xintao Niu
, Changhai Nie
:
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep Neural Networks. 152-162
Session 4: Code Optimization and Software Architecture
- Zhenyu Zhang

, Pengfei Chen
, Guangba Yu
, Zilong He
, Xiaoyun Li
:
Take Kernel Stack Overhead Out: eBPF-Enhanced Network Acceleration for Distributed Training within Ethernet. 163-174 - Yihan Chen

, Huanhuan Chen
, Yuan Yao
, Ping Yu
, Feng Xu
, Xiaoxing Ma
:
Exploiting Booster Pass Chain for Compiler Phase Ordering. 175-185 - Yitong Cheng

, Shenglong Zhao
, Yang Yu
, Zhichao Hua
:
DeFS: A Decentralized and High-Performance File System for Consortium Systems. 186-197 - Jian Lin

, Guoan Liu
, Rui Chang
, Ruimin Wang
:
Proteus: An Automatical High-Efficiency Framework for Generating Compact and Printable Shellcode on ARMv8. 198-208 - Fengjuan Gao

, Mumu Zhang
, Zixiao Zhao
, Yu Wang
, Xuandong Li
:
Modeling Go Concurrency: A Static Analysis Approach to Data Race Detection. 209-219 - Zilu Yao

, Yinjin Fu
, Nong Xiao
:
RABBIT: Managing Hierarchical Memory with Intelligent Tiering Aware Deduplication. 220-232 - Yitong Cheng

, Yang Yu
, Zhichao Hua
:
DPCapsule: A Decentralized Private Computing System With Self-Controlled Data. 233-244 - Haoming Luo

, Wanqi Yang
, Pengfei Chen
:
MicroGuard: Non-Intrusive Dynamic Analysis for Inter-Service Access Control of Microservices. 245-257
Session 5: Software Vulnerability and Security II
- Shenqianqian Zhang

, Weiyu Dong
, Jian Lin
:
Devmp: A Virtual Instruction Extraction Method for Commercial Code Virtualization Obfuscators. 258-268 - Ziliang Wang

, Ge Li
, Jia Li
, Yihong Dong
, Yingfei Xiong
, Zhi Jin
:
Line-level Semantic Structure Learning for Code Vulnerability Detection. 269-280 - Haining Meng

, Jie Lu
, Yongheng Huang
, Lian Li
:
SLVHound: Static Detection of Session Lingering Vulnerabilities in Modern Java Web Applications. 281-292 - Chengye Li

, Changshun Wu
, Rongjie Yan
:
Def-VAE: Identifying Adversarial Inputs with Robust Latent Representations. 293-304 - Kunpeng Jian

, Yanyan Zou
, Menghao Li
, Wei Huo
:
Fuzzing for Stateful Protocol Programs Based on Constraints between States and Message Types. 305-316 - Hao Wu

, Haijun Wang
, Shangwang Li
, Yin Wu
, Ming Fan
, Yitao Zhao
, Ting Liu
:
Detecting State Manipulation Vulnerabilities in Smart Contracts Using LLM and Static Analysis. 317-320
Session 6: AI for Software Engineering II
- Binghe Wang, Wuxia Jin

, Zijun Wang, Mengjie Sun, Haijun Wang:
Beyond Isolated Changes: A Context-aware and Dependency-enhanced Code Change Detection Method. 321-331 - Xianxing Fang

, Liangru Xie
, Weibin Yang
, Tianyi Zhang
, Ruitao Zhang
, Hao Wang
, Di Wu
, Yushan Pan
:
Orion: A Multi-Agent Framework for Optimizing RAG Systems through Specialized Agent Collaboration. 332-343 - Dongxun Su

, Yanjie Zhao
, Xinyi Hou
, Shenao Wang
, Haoyu Wang
:
GPT Store Mining and Analysis. 344-354 - Yaxin Wang

, Liang Wang
, Hao Hu
, Xianping Tao
:
Mining Discriminative Issue Resolution Temporal Sequential Patterns in Open Source Software Repositories. 355-365 - Yuan Wang

, Ning Ge
, Jiangxi Liu
, Zhilong Cao
, Zheping Chen
, Chunming Hu
:
Generating SysML Behavior Models via Large Language Models: an Empirical Study. 366-377 - Yu Sun

, Lingfeng Bao
, Xiaohu Yang
:
FIRE: Smart Contract Bytecode Function Identification via Graph-Refined Hybrid Feature Encoding. 378-388
Session 7: AI for Software Engineering III
- Hongyu Kuang

, Ning Zhang
, Hui Gao
, Xin Zhou
, Wesley K. G. Assunção
, Xiaoxing Ma
, Dong Shao
, Guoping Rong
, He Zhang
:
Brevity is the Soul of Wit: Condensing Code Changes to Improve Commit Message Generation. 389-401 - Zhuo Cheng

, Zhou Zou
, Qing Huang
, Zhenchang Xing
, Wei Zhang
, Shaochen Wang
, Xueting Yi
, Huan Jin
, Zhiping Liu
, Zhaojin Lu
:
DesDD: A Design-Enabled Framework with Dual-Layer Debugging for LLM-based Iterative API Orchestrating. 402-412 - Hao Zhang

, Dongjun Yu
, Lei Zhang
, Guoping Rong
, Yongda Yu
, Haifeng Shen
, He Zhang
, Dong Shao
, Hongyu Kuang
:
AUCAD: Automated Construction of Alignment Dataset from Log-Related Issues for Enhancing LLM-based Log Generation. 413-425 - Haosheng Zuo

, Feifei Niu
, Chuanyi Li
:
Enhancement Report Approval Prediction: A Comparative Study of Large Language Models. 426-436 - Xin Chen

, Zhijie Jiang
, Yong Guo
, Zhouyang Jia
, Si Zheng
, Yuanliang Zhang
, Shanshan Li
:
MetaCoder: Generating Code from Multiple Perspectives. 437-448 - Zhihao Li

, Chuanyi Li
, Changan Niu
, Ying Yan
, Jidong Ge
, Bin Luo
:
API-Repo: API-centric Repository-level Code Completion. 449-460 - Junhang Cheng

, Fang Liu
, Chengru Wu
, Li Zhang
:
AdaptiveLLM: A Framework for Selecting Optimal Cost-Efficient LLM for Code-Generation Based on CoT Length. 461-473 - Yining Yin

, Yang Feng
, Shihao Weng
, Xinyu Gao
, Jia Liu
, Zhihong Zhao
:
Lightweight Probabilistic Coverage Metrics for Efficient Testing of Deep Neural Networks. 474-486
Session 8: Software Vulnerability and Security III
- Xuanyan Zhu

, Jingxuan Zhang
, Yixuan Tang
, Weiqin Zou
, Jiayi Li
, Han Luo
:
VDLS: A Vulnerability Detection Approach Based on Execution Path Selection. 487-497 - Ningyuan Li

, Yanjie Zhao
, Shenao Wang
, Zehao Wu
, Haoyu Wang
:
Exploring Typo Squatting Threats in the Hugging Face Ecosystem. 498-509 - Yiren Zhou

, Lina Gong
, Tiantian Ma
:
Unraveling the Characterization and Propagation of Security Vulnerabilities in TensorFlow-based Deep Learning Software Supply Chain. 510-521 - Wangchenlu Huang

, Shenao Wang
, Yanjie Zhao
, Tianxiang Wang
, Yuhao Gao
, Guosheng Xu
, Haoyu Wang
:
Seeing is (Not) Believing: The Mirage Card Attack Targeting Online Social Networks. 522-532 - Chenyang Peng

, Haijun Wang
, Yin Wu
, Hao Wu
, Ming Fan
, Yitao Zhao
, Ting Liu
:
ETrace : Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis. 533-536 - Man Zhang

, Peiru Li
, Yize Shi
, Tao Yue
:
A Natural Language Guided Adaptive Model-based Testing Tool for Autonomous Driving. 537-540 - Tommi Mikkonen

, Antero Taivalsaari
:
Software Reuse in the Generative AI Era: From Cargo Cult Towards Systematic Practices. 541-544
Session 9: AloT & Microservices
- Bingkun Sun

, Jialin Ren
, Juntao Luo
, Liwei Shen
, Yongqiang Lu
, Qicai Chen
, Zhen Dong
, Xin Peng
:
EnvGuard: Guaranteeing Environment-Centric Safety and Security Properties in Web of Things System. 545-557 - Zhuoqun Xia

, Yutong Xie
, Xin Wang
:
Privacy-Preserving Authentication Scheme for V2G in social IoT Based on Certificateless Aggregate Signatures. 558-567 - Xiuhong Tan

, Yuan Yuan
, Tongqing Zhou
, Shiming He
, Yuqi Li
, Jian Zhang
:
To Split or to Merge? Exploring Multi-modal Data Flexibly for Failure Classification in Microservices. 568-577 - Lu Wang

, Xu Fan
, Yaxiao Li
, Quanwei Du
, Jialuo She
, Qingshan Li
:
Dynamic Microservice Resource Optimization Management Based on MAPE Loop. 578-588 - Georg-Daniel Schwarz

, Dirk Riehle
:
Documenting Microservice Integration with MSAdoc. 589-592

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














