Yi Li | Associate Professor | NTUJekyll2026-03-13T05:05:26+00:00https://liyiweb.com/Yi Lihttps://liyiweb.com/[email protected]https://liyiweb.com/posts/paper-accepted-by-ase-20252025-09-26T00:00:00-00:002025-09-26T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>We have three technical papers and a tool demonstration paper accepted
at ASE’25:</p>
<ol>
<li>Defects4C <a class="citation" href="#Wang2025DBL">[1]</a>: The first major benchmark for
evaluating LLMs on fixing real-world C/C++ bugs, closing a crucial gap
in automated program repair.</li>
<li>DeFiScope <a class="citation" href="#Zhong2025DVD">[2]</a>: An LLM-powered detector that finds
DeFi price manipulation attacks with 96% precision, uncovering 81
previously unknown incidents.</li>
<li>Co^2FuLL <a class="citation" href="#Dong2025ABC">[3]</a>: Makes binary code analysis accurate and
explainable by fusing context with content and using LLMs for
verification, boosting precision by 142.5%.</li>
<li>DeepTx <a class="citation" href="#Liu2025DRT">[4]</a>: A real-time Web3 transaction shield
that uses multi-modal LLM reasoning to stop phishing attacks before
they happen.</li>
</ol>
<p>DeepTx is open-source and a video demostration can be found below:</p>
<h4 id="deeptx-demo-video">DeepTx Demo Video</h4>
<!-- Courtesy of embedresponsively.com //-->
<div class="responsive-video-container">
<iframe src="https://www.youtube-nocookie.com/embed/4OfK9KCEXUM" frameborder="0" allowfullscreen=""></iframe>
</div>
<p>This year, ASE received 1190 submissions and 1136 were remaining after
desk rejection. Out of the 1136 submissions, 113 papers were directly
accepted and 132 were accepted after major revisions, which gives an
overall acceptance rate of 21.6%.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Wang2025DBL">Wang, J., Xie, X., Hu, Q., Liu, S., Yu, J., Kong, J., & Li, Y. (2025, November). Defects4C: Benchmarking Large Language Model Repair Capability with C/C++ Bugs. <i>Proceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>.</span><a class="details" href="/publication/Wang2025DBL/"><i class="fas fa-fw fa-info-circle"></i></a></li>
<li><span id="Zhong2025DVD">Zhong, J., Wu, D., Liu, Y., Xie, M., Liu, Y., Li, Y., & Liu, N. (2025, November). Detecting Various DeFi Price Manipulations with LLM Reasoning. <i>Proceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>.</span><a class="details" href="/publication/Zhong2025DVD/"><i class="fas fa-fw fa-info-circle"></i></a></li>
<li><span id="Dong2025ABC">Dong, C., Guo, J., Yang, S., Li, Y., Fang, D., Xiao, Y., Chen, Y., & Sun, L. (2025, November). Advancing Binary Code Similarity Detection via Context-Content Fusion and LLM Verification. <i>Proceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>.</span><a class="details" href="/publication/Dong2025ABC/"><i class="fas fa-fw fa-info-circle"></i></a></li>
<li><span id="Liu2025DRT">Liu, Y., Li, X., & Li, Y. (2025, November). DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning. <i>Proceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>.</span><a class="details" href="/publication/Liu2025DRT/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-ase-2025/">Papers accepted by ASE 2025</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on September 26, 2025.</p>
https://liyiweb.com/posts/paper-accepted-by-issta-20252025-06-14T00:00:00-00:002025-03-30T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>A paper <a class="citation" href="#Xu2025IMP">[1]</a> in collaboration with Xiufeng Xu (my PhD
student), Fuman Xie, Chenguang Zhu, Guangdong Bai, and Sarfraz
Khurshid was accepted at ISSTA’25. A summary of the paper is below:</p>
<blockquote>
<p>Modern AI- and Data-intensive software systems rely heavily on data
science and machine learning libraries that provide essential
algorithmic implementations and computational frameworks. These
libraries expose complex APIs whose correct usage has to follow
constraints among multiple interdependent parameters. Developers
using these APIs are expected to learn about the constraints through
the provided documentation and any discrepancy may lead to unexpected
behaviors. However, maintaining correct and consistent multi-
parameter constraints in API documentation remains a significant
challenge for API compatibility and reliability. To address this
challenge, we propose MPChecker for detecting inconsistencies between
code and documentation, specifically focusing on multi-parameter
constraints. MPChecker identifies these constraints at the code level
by exploring execution paths through symbolic execution and further
extracts corresponding constraints from documentation using large
language models (LLMs). We propose a customized fuzzy constraint logic
to reconcile the unpredictability of LLM outputs and detect logical
inconsistencies between the code and documentation constraints. We
collected and constructed two datasets from four popular data science
libraries and evaluated MPChecker on them. The results demonstrate
that MPChecker can effectively detect inconsistency issues with the
precision of 92.8%. We further reported 14 detected inconsistency
issues to the library developers, who have confirmed 11 issues at the
time of writing.</p>
</blockquote>
<p>This year, 107 out of 550 submissions were accepted at ISSTA, which
gives an acceptance rate of 19.4%.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Xu2025IMP">Xu, X., Xie, F., Zhu, C., Bai, G., Khurshid, S., & Li, Y. (2025, June). Identifying Multi-Parameter Constraint Errors in Python Data Science Library API Documentations. <i>Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>.</span><a class="details" href="/publication/Xu2025IMP/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-issta-2025/">Paper accepted by ISSTA 2025</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on March 30, 2025.</p>
https://liyiweb.com/posts/distinguished-paper-award-ndss252025-02-27T00:00:00-00:002025-02-27T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Our paper, “PropertyGPT: LLM-driven Formal Verification of Smart Contracts
through Retrieval-Augmented Property Generation” <a class="citation" href="#Liu2025PLD">[1]</a>, have
won a Distinguished Paper Award at NDSS’25.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Liu2025PLD">Liu, Y., Xue, Y., Wu, D., Sun, Y., Li, Y., Shi, M., & Liu, Y. (2025, February). PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation. <i>Proceedings of 32nd Annual Network and Distributed System Security Symposium (NDSS)</i>.</span><a class="details" href="/publication/Liu2025PLD/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/distinguished-paper-award-ndss25/">Won Distinguished Paper Award at NDSS'25</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on February 27, 2025.</p>
https://liyiweb.com/posts/paper-accepted-by-icse-20252024-11-03T00:00:00-00:002024-11-03T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>A paper <a class="citation" href="#Ma2025SAG">[1]</a> in collaboration with Lezhi Ma, Shangqing
Liu, Xiaofei Xie, and Lei Bu was accepted at ICSE’25. A summary of the
paper is below:</p>
<blockquote>
<p>In the software development process, formal program specifications
play a crucial role in various stages, including requirement
analysis, software testing, and verification. However, manually
crafting formal program specifications is rather difficult, making
the job time-consuming and labor-intensive. Moreover, it is even
more challenging to write specifications that correctly and
comprehensively describe the semantics of complex programs. To
reduce the burden on software developers, automated specification
generation methods have emerged. However, existing methods usually
rely on predefined templates or grammar, making them struggle to
accurately describe the behavior and functionality of complex
real-world programs.</p>
</blockquote>
<blockquote>
<p>To tackle this challenge, we introduce SpecGen, a novel technique
for formal program specification generation based on Large Language
Models (LLMs). Our key insight is to overcome the limitations of
existing methods by leveraging the code comprehension capability of
LLMs. The process of SpecGen consists of two phases. The first phase
employs a conversational approach that guides the LLM to generate
appropriate specifications for a given program, aiming to utilize
the ability of LLM to generate high-quality specifications. The
second phase, designed for where the LLM fails to generate correct
specifications, applies four mutation operators to the
model-generated specifications and selects verifiable specifications
from the mutated ones through a novel heuristic selection strategy
by assigning different weights of variants in an efficient
manner. We evaluate SpecGen on two datasets, including the SV-COMP
Java category benchmark and a manually constructed dataset
containing 120 programs. Experimental results demonstrate that
SpecGen succeeds in generating verifiable specifications for 279 out
of 385 programs, outperforming the existing LLM-based approaches and
conventional specification generation tools like Houdini and
Daikon. Further investigations on the quality of generated
specifications indicate that SpecGen can comprehensively articulate
the behaviors of the input program.</p>
</blockquote>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Ma2025SAG">Ma, L., Liu, S., Li, Y., Xie, X., & Bu, L. (2025, April). SpecGen: Automated Generation of Formal Program Specifications via Large Language Models. <i>Proceedings of the 47th International Conference on Software Engineering (ICSE)</i>.</span><a class="details" href="/publication/Ma2025SAG/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-icse-2025/">Paper accepted by ICSE 2025</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on November 03, 2024.</p>
https://liyiweb.com/posts/paper-accepted-by-ase-20242024-08-10T00:00:00-00:002024-08-08T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>We have a technical paper <a class="citation" href="#Wang2024AES">[1]</a> and a tool demonstration paper
<a class="citation" href="#Chen2024OAD">[2]</a> accepted at ASE’24. The first paper presents an
empirical study evaluating existing AIGC detectors in the software
domain. Despite its potential, the misuse of LLMs, especially in security and
safety-critical domains, such as academic integrity and answering questions on
Stack Overflow, poses significant concerns. In the second paper, we introduce
OpenTracer, which offers comprehensive tracking of complete transaction
information to extract user-desired data such as invariant-related
data. OpenTracer has been employed to analyze 350,800 Ethereum transactions,
successfully inferring 23 different types of invariant from predefined
templates. OpenTracer is open-source and a video demostration can be found
below.</p>
<h4 id="opentracer-demo-video">OpenTracer Demo Video</h4>
<!-- Courtesy of embedresponsively.com //-->
<div class="responsive-video-container">
<iframe src="https://www.youtube-nocookie.com/embed/vTdmjWdYd30" frameborder="0" allowfullscreen=""></iframe>
</div>
<p>This year, 118 out of 587 submissions were accepted (another 37 were
conditionally accepted) at ASE, which gives an acceptance rate of 27.3%.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Wang2024AES">Wang, J., Liu, S., Xie, X., & Li, Y. (2024). An Empirical Study to Evaluate AIGC Detectors on Code Content. <i>Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 844–856.</span><a class="details" href="/publication/Wang2024AES/"><i class="fas fa-fw fa-info-circle"></i></a></li>
<li><span id="Chen2024OAD">Chen, Z., Liu, Y., Beillahi, S. M., Li, Y., & Long, F. (2024). OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond. <i>Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 2399–2402.</span><a class="details" href="/publication/Chen2024OAD/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-ase-2024/">Papers accepted by ASE 2024</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on August 08, 2024.</p>
https://liyiweb.com/posts/paper-accepted-by-fse-20242024-04-15T00:00:00-00:002024-04-15T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>A paper <a class="citation" href="#Chen2024DIE">[1]</a> in collaboration with Zhiyang Chen, Ye Liu, Sidi
Mohamed Beillahi, and Fan Long was accepted at FSE’24. A summary of the paper
is below:</p>
<blockquote>
<p>Smart contract transactions associated with security attacks often exhibit
distinct behavioral patterns compared with historical benign transactions before
the attacking events. While many runtime monitoring and guarding mechanisms have
been proposed to validate invariants and stop anomalous transactions on the fly,
the empirical effectiveness of the invariants used remains largely
unexplored. In this paper, we studied 23 prevalent invariants of 8 categories,
which are either deployed in high-profile protocols or endorsed by leading
auditing firms and security experts. Using these well-established invariants as
templates, we developed a tool which dynamically generates new invariants
customized for a given contract based on its historical transaction data. We
evaluated our tool on 42 smart contracts that fell victim to 27 distinct
exploits on the Ethereum blockchain. Our findings reveal that the most effective
invariant guard alone can successfully block 18 of the 27 identified exploits
with minimal gas overhead. Our analysis also shows that most of the invariants
remain effective even when the experienced attackers attempt to bypass
them. Additionally, we explored the possibility of combining multiple invariant
guards, resulting in enhanced true positive rates and reduced false positive
rates.</p>
</blockquote>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Chen2024DIE">Chen, Z., Liu, Y., Beillahi, S. M., Li, Y., & Long, F. (2024). Demystifying Invariant Effectiveness for Securing Smart Contracts. <i>Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering (FSE)</i>, <i>1</i>(FSE), 1772–1795.</span><a class="details" href="/publication/Chen2024DIE/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-fse-2024/">Paper accepted by FSE 2024</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on April 15, 2024.</p>
https://liyiweb.com/posts/paper-accepted-by-csur-intention2024-04-03T00:00:00-00:002024-04-03T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>A paper <a class="citation" href="#Kruger2024AMS">[1]</a> in collaboration with Jacob Krüger, Kirill
Lossev, Chenguang Zhu, Marsha Chechik, Thorsten Berger, and Julia Rubin was
accepted by ACM Computing Surveys. A quick summary of the paper is given below.</p>
<blockquote>
<p>Every software system undergoes changes, for example, to add new features, fix
bugs, or refactor code. The importance of understanding software changes has
been widely recognized, resulting in various techniques and studies, for
instance, on change-impact analysis or classifying developers’ activities. Since
changes are triggered by developers’ intentions—something they plan or want to
change in the system, many researchers have studied intentions behind changes.
While there appears to be a consensus among software-engineering researchers and
practitioners that knowing the intentions behind software changes is important,
it is not clear how developers can actually benefit from this knowledge. In
fact, there is no consolidated, recent overview of the state-of-the-art on
software-change intentions (SCIs) and their relevance for software engineering.
We present a meta-study of 122 publications, which we used to derive a
categorization of SCIs; and to discuss motivations, evidence, and techniques
relating to SCIs. Unfortunately, we found that individual pieces of research
are often disconnected from each other because a common understanding is
missing. Similarly, some publications showcase the potential of knowing SCIs,
but more substantial research to understand the practical benefits of knowing
SCIs is needed. Our contributions can help researchers and practitioners
improve their understanding of SCIs and how SCIs can aid software engineering
tasks.</p>
</blockquote>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Kruger2024AMS">Krüger, J., Li, Y., Lossev, K., Zhu, C., Chechik, M., Berger, T., & Rubin, J. (2024). A Meta-Study of Software-Change Intentions. <i>ACM Computing Surveys</i>, <i>56</i>(12), 1–41.</span><a class="details" href="/publication/Kruger2024AMS/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-csur-intention/">Paper accepted by ACM Computing Surveys</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on April 03, 2024.</p>
https://liyiweb.com/posts/paper-accepted-by-infocom-20242023-12-01T00:00:00-00:002023-12-01T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Xiaodong Qi’s paper <a class="citation" href="#Qi2024LSL">[1]</a> was accepted at INFOCOM. A
quick summary of the paper is given below.</p>
<blockquote>
<p>Sharding is a prevailing solution to enhance the scalability of
current blockchain systems. However, the cross-shard commit protocols
adopted in these systems to commit cross-shard transactions commonly
incur multi-round shard-to-shard communication, leading to low
performance. Furthermore, most solutions only focus on simple transfer
transactions without supporting complex smart contracts, preventing
sharding from widespread applications. In this paper, we propose
LightCross, a novel blockchain sharding system that enables efficient
execution of complex cross-shard smart contracts. First, LightCross
offloads the execution of cross-shard transactions into off-chain
executors equipped with the TEE hardware, which can accommodate
execution for arbitrarily complex contracts. Second, we design a
lightweight cross-shard commit protocol to commit cross-shard
transactions without multi-round shard-to-shard communication between
shards. Last, LightCross lowers the cross-shard transaction ratio by
dynamically changing the distribution of contracts according to
historical transactions. We implemented the LightCross prototype based
on the FISCO-BCOS project and evaluated it in real-world blockchain
environments, showing that LightCross can achieve 2.6× more throughput
than state-of-the-art sharding systems.</p>
</blockquote>
<p>This year, 256 out of 1307 submissions were accepted at INFOCOM, which
gives an acceptance rate of 19.6%.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Qi2024LSL">Qi, X., & Li, Y. (2024). LightCross: Sharding with Lightweight Cross-Shard Execution for Smart Contracts. <i>Proceedings of the 42nd IEEE International Conference on Computer Communications (INFOCOM)</i>, 1681–1690.</span><a class="details" href="/publication/Qi2024LSL/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-infocom-2024/">Paper accepted by INFOCOM 2024</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on December 01, 2023.</p>
https://liyiweb.com/posts/distinguished-paper-award-ase232023-09-14T00:00:00-00:002023-09-14T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Our paper, “EndWatch: A Practical Method for Detecting
Non-Termination in Real-World Software” <a class="citation" href="#Zhang2023EAP">[1]</a>, have
won an ACM SIGSOFT Distinguished Paper Award at ASE’23. These were
among the ten Distinguished Paper Awards selected from the 134
accepted papers (out of 629 submissions).</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Zhang2023EAP">Zhang, Y., Xie, X., Li, Y., Chen, S., Zhang, C., & Li, X. (2023). EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. <i>Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 686–697.</span><a class="details" href="/publication/Zhang2023EAP/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/distinguished-paper-award-ase23/">Won ACM SIGSOFT Distinguished Paper Award at ASE'23</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on September 14, 2023.</p>
https://liyiweb.com/posts/paper-accepted-by-fse-2023-ivr2023-07-19T00:00:00-00:002023-07-19T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>A vision paper <a class="citation" href="#Kruger2023AVO">[1]</a> tegother with Jacob Krüger,
Chenguang Zhu, Marsha Chechik, Thorsten Berger, and Julia Rubin, is
accepted at the FSE’23 Ideas, Visions and Reflections track. A summary
of the paper is below:</p>
<blockquote>
<p>Intentions are fundamental in software engineering, but are
typically only implicitly considered through various related
abstractions, such as requirements, use cases, features, or
issues. Specifically, software engineers develop and evolve a software
system based on such abstractions of a stakeholder’s
intention—something a stakeholder wants the system to be able to
do. Unfortunately, existing abstractions are (inherently) limited when
it comes to representing stakeholder intentions and are used for
documenting only. So, whether a change in a system fulfills its
underlying intention (and only this one) is an essential problem in
practice that motivates many research areas (e.g., testing to ensure
intended behavior, untangling intentions in commits). We argue that
none of the existing abstractions is ideal for capturing intentions
and controlling software evolution, which is why intentions are often
vague and must be recovered, untangled, or understood in
retrospect. In this paper, we reflect on the role of intentions in
software engineering and sketch how improving their management may
support developers. Particularly, per we argue that continuously
managing and controlling intentions as well as their fulfillment has
the potential to improve the reasoning about what stakeholder requests
have been addressed, avoid misunderstandings, and prevent expensive
retrospective analyses. To guide future research for achieving such
benefits for researchers and practitioners, we discuss the relations
of different abstractions to intentions and propose steps towards
managing intentions.</p>
</blockquote>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Kruger2023AVO">Krüger, J., Li, Y., Zhu, C., Chechik, M., Berger, T., & Rubin, J. (2023). A Vision on Intentions in Software Engineering. <i>Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE)</i>, 2117–2121.</span><a class="details" href="/publication/Kruger2023AVO/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-fse-2023-ivr/">Paper accepted by FSE 2023 Ideas, Visions and Reflections Track</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on July 19, 2023.</p>
https://liyiweb.com/posts/paper-accepted-by-ase-20232023-07-18T00:00:00-00:002023-07-18T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>We have a technical paper <a class="citation" href="#Zhang2023EAP">[1]</a> and a tool demonstration paper
<a class="citation" href="#Xu2023CAD">[2]</a> accepted at ASE’23. The technical paper presents a
practical method for detecting no-termination bugs in real-world software
systems. While loop termination has been studied for many years, existing
methods have limited scalability and are only effective on small programs. Our
technique, EndWatch, is shown more effective than the state-of-the-art tools on
standard benchmarks (detecting 87% of non-terminating programs while the best
baseline detects only 67%), and useful in detecting non-termination in
real-world projects (detecting 90% of known non-termination CVEs and 4 unknown
bugs). In the second paper, we introduce a new dataset, CompSuite, which
includes 123 real-world incompatibility issues. CompSuite is made available
online and a video demostration can be found below.</p>
<h4 id="compsuite-demo-video">CompSuite Demo Video</h4>
<!-- Courtesy of embedresponsively.com //-->
<div class="responsive-video-container">
<iframe src="https://www.youtube-nocookie.com/embed/7DQGsGs_65s" frameborder="0" allowfullscreen=""></iframe>
</div>
<p>This year, 103 out of 629 submissions were accepted (another 31 were
conditionally accepted) at ASE, which gives an acceptance rate of 21%.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Zhang2023EAP">Zhang, Y., Xie, X., Li, Y., Chen, S., Zhang, C., & Li, X. (2023). EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. <i>Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 686–697.</span><a class="details" href="/publication/Zhang2023EAP/"><i class="fas fa-fw fa-info-circle"></i></a></li>
<li><span id="Xu2023CAD">Xu, X., Zhu, C., & Li, Y. (2023). CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues. <i>Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 2098–2101.</span><a class="details" href="/publication/Xu2023CAD/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-ase-2023/">Papers accepted by ASE 2023</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on July 18, 2023.</p>
https://liyiweb.com/posts/paper-accepted-by-icdcs-20232023-04-10T00:00:00-00:002023-04-10T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Our paper <a class="citation" href="#Qi2023SCP">[1]</a> in collaboration with Xiaodong Qi and Jiao Jiao
was accepted at ICDCS. A quick summary of the paper is given below.</p>
<blockquote>
<p>As various optimizations being proposed recently, the performance of
blockchains is no longer limited by the consensus protocols, successfully
scaling to thousands of transactions per second. To further improve
blockchains’ throughput, exploiting the parallelism in smart contract
executions becomes a clear solution to resolve the new performance
bottleneck. The existing techniques perform concurrency control on smart
contract transactions based on pre-determined read/write sets, which can
hardly be calculated precisely. As a result, many parallelization
opportunities are missed in order to maintain the correctness of transaction
executions. In this paper, we propose a novel execution scheduling framework,
DMVCC, to further increase the parallelism in smart contract executions, via
more fine-grained control on state accesses. DMVCC improves over existing
techniques with two key features: (1) write versioning, eliminating the
write-write conflicts between transactions, and (2) early-write visibility,
enabling other transactions to read the writes from a transaction earlier,
before it being committed. We integrated DMVCC into the Ethereum Virtual
Machine, to evaluate its performance in real-world blockchain
environments. The experimental results show that DMVCC doubles the parallel
speedup achievable to a 20× overall speedup, compared with the serial
execution baseline, approaching the theoretical optimum.</p>
</blockquote>
<p>This year, 83 out of 439 submissions were accepted at ICDCS, which gives an
acceptance rate of 18.9%.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Qi2023SCP">Qi, X., Jiao, J., & Li, Y. (2023). Smart Contract Parallel Execution with Fine-Grained State Accesses. <i>Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems (ICDCS)</i>, 841–852.</span><a class="details" href="/publication/Qi2023SCP/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-icdcs-2023/">Paper accepted by ICDCS 2023</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on April 10, 2023.</p>
https://liyiweb.com/posts/paper-accepted-by-icse-20232022-12-11T00:00:00-00:002022-12-11T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Our paper <a class="citation" href="#Badihi2023RIC">[1]</a> in collaboration with Sahar Badihi, Khaled
Ahmed, and Julia Rubin was accepted at ICSE. A quick summary of the paper is
given below.</p>
<blockquote>
<p>Numerous program slicing approaches aim at helping developers troubleshoot
regression failures – one of the most time-consuming development tasks. The
main idea behind these approaches is to identify a subset of interdependent
program statements relevant to the failure, minimizing the amount of code
developers need to inspect. Accuracy and reduction rate achieved by these
techniques are key considerations toward their applicability in practice:
inspecting only the statements identified in the slice should be faster and more
efficient than inspecting the code in full. This paper reports on our experiment
applying one of the most recent and accurate slicing approaches, dual slicing,
to the task of troubleshooting regression failures in eight large, open-source
software projects. The results of our experiments show that slices produced in
this setup are still very large to be comfortably managed. Moreover, we observe
that most statements in the slice deal with propagation of information between
changed code blocks; these statements are essential for obtaining the necessary
context for the changes but are not responsible for the failure
directly. Motivated by this insight, we propose a novel approach, implemented in
a tool named ConSumSlice, for reducing the size of a slice by accurately
identifying and summarizing the propagation-related code blocks. Our evaluation
of ConSumSlice shows that it is able to produce slices that are 75% shorter than
the original ones for our case-study projects (299 vs. 2,449 code-level
statements, on average), thus, reducing the amount of information developers
need to inspect without losing the necessary contextual information. We believe
our study and the proposed approach will help promote the efficient integration
of slicing-based techniques in debugging activities and will inspire further
research in this area.</p>
</blockquote>
<p>This year, 209 out of 796 submissions were accepted at ICSE, and
35 of them were conditionally accepted, which gives an acceptance rate of
26%.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Badihi2023RIC">Badihi, S., Ahmed, K., Li, Y., & Rubin, J. (2023). Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis. <i>Proceedings of the 45th International Conference on Software Engineering (ICSE)</i>, 563–575.</span><a class="details" href="/publication/Badihi2023RIC/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-icse-2023/">Paper accepted by ICSE 2023</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on December 11, 2022.</p>
https://liyiweb.com/posts/csu-paper-accepted-by-tosem2022-11-26T00:00:00-00:002022-11-26T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Our paper <a class="citation" href="#Zhu2022CSU">[1]</a> in collaboration with Chenguang Zhu, Mengshi
Zhang, Xiuheng Wu, and Xiufeng Xu was accepted by TOSEM. A quick summary of the
paper is given below.</p>
<blockquote>
<p>Modern software systems are complex and they heavily rely on external
libraries developed by different teams and organizations. Such systems suffer
from higher instability due to incompatibility issues caused by library
upgrades. In this paper, we address the problem by investigating the impact of
a library upgrade on the behaviors of its clients. We developed CompCheck, an
automated upgrade compatibility checking framework which generates
incompatibility-revealing tests based on previous examples. CompCheck first
establishes an offline knowledge base of incompatibility issues by mining from
open source projects and their upgrades. It then discovers incompatibilities
for a specific client project, by searching for similar library usages in the
knowledge base and generating tests to reveal the problems. We evaluated
CompCheck on 202 call sites of 35 open-source projects and the results show
that CompCheck successfully revealed incompatibility issues on 76 call sites,
72.7% and 94.9% more than two existing techniques, confirming CompCheck’s
applicability and effectiveness.</p>
</blockquote>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Zhu2022CSU">Zhu, C., Zhang, M., Wu, X., Xu, X., & Li, Y. (2023). Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery. <i>ACM Transactions on Software Engineering and Methodology</i>, <i>32</i>(4), 1–31.</span><a class="details" href="/publication/Zhu2022CSU/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/csu-paper-accepted-by-tosem/">Paper accepted by ACM Transactions on Software Engineering and Methodology</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on November 26, 2022.</p>
https://liyiweb.com/posts/paper-accepted-by-ase-20222022-09-15T00:00:00-00:002022-09-15T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Two papers were recently accepted at ASE’22. The first one <a class="citation" href="#Zhu2022ISS">[1]</a>
is on the detection of API documentation errors in Solidity smart contract
libraries. This is a joint work with my former research assistant, Chenguang
Zhu, as well as my PhD students, Ye Liu and Xiuheng Wu. The second one <a class="citation" href="#Tang2022TUT">[2]</a> is an empirical study on the third-party library dependencies in
the C/C++ Ecosystem.</p>
<p>This year, 78 out of 527 submissions (4 desk rejected) were accepted at ASE, and
38 submissions were conditionally accepted, which gives an acceptance rate of
22%.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Zhu2022ISS">Zhu, C., Liu, Y., Wu, X., & Li, Y. (2022). Identifying Solidity Smart Contract API Documentation Errors. <i>Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 1–13.</span><a class="details" href="/publication/Zhu2022ISS/"><i class="fas fa-fw fa-info-circle"></i></a></li>
<li><span id="Tang2022TUT">Tang, W., Xu, Z., Liu, C., Wu, J., Yang, S., Li, Y., Luo, P., & Liu, Y. (2022). Towards Understanding Third-Party Library Dependency in C/C++ Ecosystem. <i>Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 1–12.</span><a class="details" href="/publication/Tang2022TUT/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-ase-2022/">Papers accepted by ASE 2022</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on September 15, 2022.</p>
https://liyiweb.com/posts/paper-accepted-by-fse-2022-demo2022-08-12T00:00:00-00:002022-08-12T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Most of the existing smart contract symbolic execution tools perform analysis on
bytecode, which loses high-level semantic information presented in source
code. This makes interactive analysis tasks—such as visualization and
debugging—extremely challenging, and significantly limits the tool usability.</p>
<p>With Shang-Wei Lin, Palina Tolmach, and Ye Liu, we present SolSEE, a
source-level symbolic execution engine for Solidity smart contracts. We describe
the design of SolSEE, highlight its key features, and demonstrate its usages
through a Web-based user interface. SolSEE demonstrates advantages over other
existing source-level analysis tools in the advanced Solidity language features
it supports and analysis flexibility.</p>
<p>A paper <a class="citation" href="#Lin2022SAS">[1]</a> describing SolSEE is accepted at the FSE’22
Demonstration track. You can find the video demonstration of the tool below.</p>
<h4 id="solsee-demo-video">SolSEE Demo Video</h4>
<!-- Courtesy of embedresponsively.com //-->
<div class="responsive-video-container">
<iframe src="https://www.youtube-nocookie.com/embed/jxShWuTwSzI" frameborder="0" allowfullscreen=""></iframe>
</div>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Lin2022SAS">Lin, S.-W., Tolmach, P., Liu, Y., & Li, Y. (2022). SolSEE: A Source-Level Symbolic Execution Engine for Solidity. <i>Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE)</i>, 1687–1691.</span><a class="details" href="/publication/Lin2022SAS/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-fse-2022-demo/">Paper accepted by FSE 2022 Demonstrations Track</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on August 12, 2022.</p>
https://liyiweb.com/posts/phd-positions2022-08-04T00:00:00-00:002022-08-02T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>A fully-funded PhD position is available at the Nanyang Technological University
(NTU) in the area of Blockchain and Smart Contracts. The successful applicant
will start from Aug 2023.</p>
<p>Students with strong background in software engineering, software security,
distributed systems, and other relevant fields are encouraged to apply. The
<a href="https://www.ntu.edu.sg/admissions/graduate/financialmatters/scholarships/rss">NTU Research
Scholarship</a>
provides a monthly stipend plus a tuition fee subsidy.</p>
<p>Interested candidates should send their CVs to Yi Li
(<a href="mailto:[email protected]?subject=PhD Application">[email protected]</a>).</p>
<h4 id="about-ntu-scse-and-singapore">About NTU, SCSE, and Singapore</h4>
<p>NTU is a fast-rising young university. It is now placed No. 11 in the world
according to the QS World University Rankings (2020) and No. 2 among
universities under 50 years by the Times Higher Education (2022). The School of
Computer Science and Engineering (SCSE) of NTU is ranked 4th and 8th in the
computer science subject in the world according to the 2021 US News ranking and
2022 Global Ranking of Academic Subjects (Shanghai Ranking),
respectively. Moreover, you will enjoy multiple advantages of studying in
Singapore including (1) internationally competitive stipend, (2) high-quality
living, and (3) world’s safest multicultural environment.</p>
<p><a href="https://liyiweb.com/posts/phd-positions/">PhD Scholarship Available at NTU</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on August 02, 2022.</p>
https://liyiweb.com/posts/distinguished-paper-award-issta222022-07-13T00:00:00-00:002022-07-13T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Both of our papers, “Finding Permission Bugs in Smart Contracts with Role
Mining” and “Cross-Lingual Transfer Learning for Statistical Type Inference”,
have won <a href="https://www.sigsoft.org/awards/distinguishedPaperAward.html">ACM SIGSOFT Distinguished Paper
Awards</a> at
ISSTA’22.</p>
<p><a href="https://liyiweb.com/posts/distinguished-paper-award-issta22/">Won two ACM SIGSOFT Distinguished Paper Awards</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on July 13, 2022.</p>
https://liyiweb.com/posts/paper-accepted-by-ase-2022-nier2022-07-09T00:00:00-00:002022-07-09T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Programming errors enable security attacks on smart contracts, which are used to
manage large sums of financial assets. Automated program repair (APR) techniques
aim to reduce developers’ burden of manually fixing bugs by automatically
generating patches for a given issue. Existing APR tools for smart contracts
focus on mitigating typical smart contract vulnerabilities rather than
violations of functional specification. However, in decentralized financial
(DeFi) smart contracts, the inconsistency between intended behavior and
implementation translates into the deviation from the underlying financial
model, resulting in irrecoverable monetary losses for the application and its
users.</p>
<p>With Palina Tolmach and Shang-Wei Lin, we propose DeFinery <a class="citation" href="#Tolmach2022PBA">[1]</a>—a technique for automated repair of a smart contract that
does not satisfy a user-defined correctness property, financial or otherwise. To
explore a larger set of diverse patches while providing formal correctness
guarantees w.r.t. the intended behavior, we combine search-based patch
generation with semantic analysis of an original program for inferring its
specification. Our experiments in repairing nine real-world and benchmark smart
contracts reveal that DeFinery efficiently navigates the search space and
generates higher-quality patches that cannot be obtained by other smart contract
APR tools.</p>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Tolmach2022PBA">Tolmach, P., Li, Y., & Lin, S.-W. (2022). Property-Based Automated Repair of DeFi Protocols. <i>Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 1–5.</span><a class="details" href="/publication/Tolmach2022PBA/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-ase-2022-nier/">Paper accepted by ASE 2022 NIER Track</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on July 09, 2022.</p>
https://liyiweb.com/posts/paper-accepted-by-ase-2022-demo2022-07-09T00:00:00-00:002022-07-09T00:00:00+00:00Yi Lihttps://liyiweb.com[email protected]
<p>Smart contracts are self-executing computer programs deployed on blockchain to
enable trustworthy exchange of value without the need of a central
authority. With the absence of documentation and specifications, routine tasks
such as program understanding, maintenance, verification, and validation, remain
challenging for smart contracts.</p>
<p>With my PhD student, Ye Liu, we propose a dynamic invariant detection tool,
InvCon, for Ethereum smart contracts to mitigate this issue. The detected
invariants can be used to not only support the reverse engineering of contract
specifications, but also enable standard-compliance checking for contract
implementations. InvCon provides a <a href="http://www.smartcontractsecurity.org/invcon">Web-based
interface</a>.</p>
<p>A paper <a class="citation" href="#Liu2022IAD">[1]</a> describing InvCon is accepted at the ASE’22 Demonstration track.
You can find the video demonstration of the tool below.</p>
<h4 id="invcon-demo-video">InvCon Demo Video</h4>
<!-- Courtesy of embedresponsively.com //-->
<div class="responsive-video-container">
<iframe src="https://www.youtube-nocookie.com/embed/Y1QBHjDSMYk" frameborder="0" allowfullscreen=""></iframe>
</div>
<h3 id="references">References</h3>
<ol class="article-wrap"><li><span id="Liu2022IAD">Liu, Y., & Li, Y. (2022). InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts. <i>Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 1–4.</span><a class="details" href="/publication/Liu2022IAD/"><i class="fas fa-fw fa-info-circle"></i></a></li></ol>
<p><a href="https://liyiweb.com/posts/paper-accepted-by-ase-2022-demo/">Paper accepted by ASE 2022 Demonstrations Track</a> was originally published by Yi Li at <a href="https://liyiweb.com">Yi Li | Associate Professor | NTU</a> on July 09, 2022.</p>