Internetware 2025
Fri 20 - Sun 22 June 2025 Trondheim, Norway
co-located with FSE 2025

The Internetware 2025 Tool Demonstration Track provides a unique opportunity to showcase innovative tools and artifacts at a well-established conference in its 16th edition, co-located with FSE 2025. This offers unparalleled visibility and the chance to engage with a diverse, interdisciplinary audience.

The track encourages valuable feedback and discussion, making it ideal for presenting both early prototypes and mature tools. With its broad and forward-looking scope, Internetware is the perfect platform to highlight impactful contributions in the dynamic world of Internet-based software.

We invite submissions presenting:

  • Early implementations of novel tools.

  • Mature prototypes with new and innovative features.

Submissions should include open-source code or data, and we encourage live demonstrations to improve the understanding of presented tools. Authors of regular research papers are welcome to submit complementary demonstration papers to extend their contributions further.

Topics of Interest

The Tool Demonstration Track welcomes submissions on a diverse range of research topics, emphasizing innovative tools and techniques aligned with the principles of Internetware. The topics of interest for the Tool Demonstration Track are the same as those of the Research Track.

Join us in Trondheim to shape the future of Internetware!

Dates
Tracks

This program is tentative and subject to change.

You're viewing the program in a time zone which is different from your device's time zone change time zone

Fri 20 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

09:00 - 10:30
Opening & KeynoteResearch Track / Keynotes at Cosmos 3A
Chair(s): Ge Li Peking University, Leonardo Montecchi Norwegian University of Science and Technology (NTNU), Mauro Pezzè University of Milano-Bicocca, William Chu Tunghai University, Cuiyun Gao Harbin Institute of Technology, Shenzhen
09:00
10m
Day opening
Opening
Research Track

09:10
20m
Other
Photo
Research Track

09:30
60m
Keynote
Keynote 1 (Zhi Jin)
Keynotes
Zhi Jin Peking University
10:30 - 11:00
Coffee BreakResearch Track
10:30
30m
Break
Coffee Break
Research Track

11:00 - 13:00
Keynote & Session1: Software Vulnerability and Security IResearch Track / Keynotes at Cosmos 3A
Chair(s): William Chu Tunghai University
11:00
60m
Keynote
Keynote 2: Coding with the Machine: Promises and Perils in AI-Driven Software Engineering
Keynotes
Leon Moonen Simula Research Laboratory & BI Norwegian Business School
12:00
15m
Talk
Towards understanding the security issues of Python programs
Research Track
Hongcheng Fan Nanjing University, di liu Jiangsu Police Institute, Jielun Wu Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Baowen Xu Nanjing University
12:15
15m
Talk
A Novel LLM Approach of Cybersecurity Threat Analysis and Response
Research Track
TIAN HU Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Shangyuan Zhuang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaorui Guo Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Jiyan Sun Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Yinlong Liu Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Wei Ma Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Hongchao Wang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaolingfeng Innovation Academy for Microsatellites of Chinese Academy of Science, zhangxiaojie Innovation Academy for Microsatellites of Chinese Academy of Science
12:30
15m
Talk
Measuring and Explaining the Effects of Android App Transformations in Online Malware Detection
Research Track
Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Xiaodong Zhang University of Chinese Academy of Science, Haoyu Wang Huazhong University of Science and Technology, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University
12:45
15m
Talk
Leveraging Visible Widget Sizes for Detecting Repackaged Android Apps
Research Track
Jun Ma Nanjing University, Weixiang Huang Nanjing University, Chun Cao Nanjing University
Pre-print
13:00 - 14:00
13:00
60m
Lunch
Lunch
Research Track

14:00 - 15:30
Session2: AI for Software Engineering IResearch Track at Cosmos 3A
Chair(s): Jialun Cao Hong Kong University of Science and Technology
14:00
15m
Talk
Code Retrieval with Mixture of Experts Prototype Learning Based on Classification
Research Track
Feng Ling School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Guoheng Huang School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Jingchao Wang School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Xiaochen Yuan Faculty of Applied Sciences, Macau Polytechnic University, Macau, China, Xuhang Chen School of Computer Science and Engineering, Huizhou University, Huizhou 516001, China, XueYong Zhang School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Fanlong Zhang School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Chi-Man Pun Department of Computer and Information Science, University of Macau, Macau, China
14:15
15m
Talk
Issue Retrieval and Verification Enhanced Supplementary Code Comment Generation
Research Track
Yanzhen Zou Peking University, Xianlin Zhao Peking University, Xinglu Pan Peking University, Bing Xie Peking University
14:30
15m
Talk
CodeCleaner: Mitigating Data Contamination for LLM Benchmarking
Research Track
Jialun Cao Hong Kong University of Science and Technology, Songqiang Chen The Hong Kong University of Science and Technology, Wuqi Zhang Mega Labs, Hau Ching Lo The Hong Kong University of Science and Technology, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shing-Chi Cheung Hong Kong University of Science and Technology
14:45
15m
Talk
LASER:Script Execution by Autonomous Agents for On-demand Traffic Simulation
Research Track
Hao Gao Nanjing University, Jingyue Wang Nanjing University, Wenyang Fang Nanjing University, Jingwei Xu , Yunpeng Huang Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma Nanjing University
15:00
15m
Talk
Tech-ASan: Two-stage check for Address Sanitizer
Research Track
Yixuan Cao ShenZhen University, Yuhong Feng Shenzhen University, Huafeng Li Shenzhen University, Chongyi Huang Shenzhen University, Fangcao Jian Shenzhen University, Haoran Li Shenzhen University, Xu Wang Shenzhen University
15:30 - 16:00
Coffee BreakResearch Track
15:30
30m
Break
Coffee Break
Research Track

16:00 - 17:30
Session3: Software Testing and Quality AssuranceResearch Track / Tool Demonstration Track / New Idea Track at Cosmos 3A
Chair(s): Yanjie Zhao Huazhong University of Science and Technology
16:00
15m
Talk
SRLRF: Fine-Grained Root Cause Analysis and Prediction for Compiler Optimization Defects
Research Track
Han Luo Nanjing University of Aeronautics and Astronautics, Yixuan Tang Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Xuanyan Zhu Nanjing University of Aeronautics and Astronautics, Jiayi Li Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics, Jiaqi Liu National Key Laborarory on Test Physics & Numerical Mathematics
16:15
15m
Talk
Revisit the Intuition of Mutation-Based Fault Localization in Real-world Programs
Research Track
Chenliang Xing Wuhan University, Gong Chen Wuhan University, Qi Xin Wuhan University, Xiaoyuan Xie Wuhan University
16:30
15m
Talk
Emerging Compiler Testing Based on Test Case Reuse
Research Track
Kelin Zhu School of Intelligent Software and Engineering, Nanjing University, Suzhou 215163, China, Yu Wang Nanjing University, Linzhang Wang State Key Laboratory for Novel Software Technology (Nanjing University, Nanjing 210023, China, Xuandong Li Nanjing University
16:45
10m
Talk
UITrans: Seamless UI Translation from Android to HarmonyOSBest Tool Demo Award
Tool Demonstration Track
Lina Gong Nanjing University of Aeronautics and Astronautic, Chen Wang Nanjing University of Aeronautics and Astronautics, Di Cui Xidian University, Yujun Huang Nanjing University of Aeronautics and Astronautics, Mingqiang Wei Nanjing University of Aeronautics and Astronautics
16:55
10m
Talk
Graph-based Data Augmentation for API Misuse Detection
New Idea Track
Yi Li University of Texas at Dallas, Tien N. Nguyen University of Texas at Dallas
17:05
10m
Talk
XR4PD: Augmented Reality for Visualising Problem Diagrams in Requirements Analysis
New Idea Track
Yang Hua Guangxi Normal University, Hongbin Xiao Guangxi Key Lab of Multi-Source Information Mining and Securit(Guangxi Normal University), Wenhao Wang Guangxi Normal University, Zhi Li Guangxi Normal University
17:15
15m
Talk
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep Neural Networks
Research Track
Jingling Wang Nanjing University, Shuwei Qiu Nanjing University, Peng Wang Nanjing University, Jiyuan Song Nanjing University, Huayao Wu Nanjing University, Xintao Niu Nanjing University, Changhai Nie Nanjing University
Pre-print Media Attached
19:00 - 21:00
Conference ReceptionResearch Track at Kafe To Tårn

Sat 21 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

10:30 - 11:00
Coffee BreakResearch Track
10:30
30m
Break
Coffee Break
Research Track

11:00 - 13:00
Session4: Code Optimization and Software ArchitectureResearch Track at Cosmos 3A
Chair(s): Changhai Nie Nanjing University
11:00
15m
Talk
Take Kernel Stack Overhead Out: eBPF-Enhanced Network Acceleration for Distributed Training within Ethernet
Research Track
Zhenyu Zhang School of Computer Science and Engineering, Sun Yat-sen University, Pengfei Chen Sun Yat-sen University, Guangba Yu School of Computer Science and Engineering, Sun Yat-sen University, Zilong He Sun Yat-sen University, Xiaoyun Li Sun Yat-sen University
11:15
15m
Talk
Exploiting Booster Pass Chain for Compiler Phase Ordering
Research Track
yihan chen , Huanhuan Chen Nanjing University, Yuan Yao Nanjing University, Ping Yu Nanjing University, Feng Xu Nanjing University, Xiaoxing Ma Nanjing University
11:30
15m
Talk
DeFS: A Decentralized and High-Performance File System for Consortium Systems
Research Track
Yitong Cheng Shanghai JiaoTong University, Shenglong Zhao Shanghai JiaoTong University, Yang Yu Shanghai Jiao Tong University, China, Zhichao Hua Shanghai Jiao Tong University
11:45
15m
Talk
Proteus: An Automatical High-Efficiency Framework for Generating Compact and Printable Shellcode on ARMv8
Research Track
Jian Lin Information Engineering University, Guoan Liu Information Engineering University, Rui Chang Zhejiang University, Ruimin Wang Information Engineering University
12:00
15m
Talk
Modeling Go Concurrency: A Static Analysis Approach to Data Race Detection
Research Track
Fengjuan Gao Nanjing University of Science and Technology, Mumu Zhang Nanjing University, Zixiao Zhao Nanjing University, Yu Wang Nanjing University, Xuandong Li Nanjing University
12:15
15m
Talk
RABBIT: Managing Hierarchical Memory with Intelligent Tiering Aware Deduplication
Research Track
Zilu Yao National University of Defense Technology, Yinjin Fu Sun Yat-sen University, Nong Xiao National University of Defense Technology & Sun Yat-sen University
12:30
15m
Talk
DPCapsule: A Decentralized Private Computing System With Self-Controlled Data
Research Track
Yitong Cheng Shanghai JiaoTong University, Yang Yu Shanghai Jiao Tong University, China, Zhichao Hua Shanghai Jiao Tong University
12:45
15m
Talk
MicroGuard:Non-Intrusive Dynamic Analysis for Inter-Service Access Control of Microservices
Research Track
Haoming Luo School of Computer Science and Engineering, Sun Yat-sen University, Wanqi  Yang Sun Yat-Sen University, Pengfei Chen Sun Yat-sen University
11:00 - 13:00
Session7: AI for Software Engineering IIIResearch Track at Cosmos 3C
Chair(s): Lina Gong Nanjing University of Aeronautics and Astronautic
11:00
15m
Talk
Brevity is the Soul of Wit: Condensing Code Changes to Improve Commit Message Generation
Research Track
Hongyu Kuang Nanjing University, Ning Zhang Nanjing University, Hui Gao Nanjing University, Xin Zhou Nanjing University, Wesley Assunção North Carolina State University, Xiaoxing Ma Nanjing University, Dong Shao Nanjing University, Guoping Rong Nanjing University, He Zhang Nanjing University
11:15
15m
Talk
DesDD: A Design-Enabled Framework with Dual-Layer Debugging for LLM-based Iterative API Orchestrating
Research Track
Zhuo Cheng Jiangxi normal University, Zhou Zou Jiangxi Normal University, Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing CSIRO's Data61, Wei Zhang Jiangxi Meteorological Disaster Emergency Early Warning Center, Jiangxi Meteorological Bureau, Shaochen Wang Jiangxi Normal Univesity, Xueting Yi Jiangxi Meteorological Disaster Emergency Early Warning Center, Jiangxi Meteorological Bureau, Huan Jin School of Information Engineering, Jiangxi University of Technology, Zhiping Liu College of Information Engineering, Gandong University, Zhaojin Lu Jiangxi Tellhow Animation College, Tellhow Group Co.,LTD
11:30
15m
Talk
AUCAD: Automated Construction of Alignment Dataset from Log-Related Issues for Enhancing LLM-based Log Generation
Research Track
Hao Zhang Nanjing University, Dongjun Yu Nanjing University, Lei Zhang Nanjing University, Guoping Rong Nanjing University, YongdaYu Nanjing University, Haifeng Shen Southern Cross University, He Zhang Nanjing University, Dong Shao Nanjing University, Hongyu Kuang Nanjing University
11:45
15m
Talk
Enhancement Report Approval Prediction: A Comparative Study of Large Language Models
Research Track
Haosheng Zuo Nanjing University, Feifei Niu University of Ottawa, Chuanyi Li Nanjing University
12:00
15m
Talk
MetaCoder: Generating Code from Multiple Perspectives
Research Track
chen xin , Zhijie Jiang National University of Defense Technology, Yong Guo National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Si Zheng National University of Defense Technology, Yuanliang Zhang National University of Defense Technology, Shanshan Li National University of Defense Technology
12:15
15m
Talk
API-Repo: API-centric Repository-level Code Completion
Research Track
Zhihao Li State Key Laboratory for Novel Software and Technology, Nanjing University, Chuanyi Li Nanjing University, Changan Niu Software Institute, Nanjing University, Ying Yan State Key Laboratory for Novel Software and Technology, Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University
12:30
15m
Talk
AdaptiveLLM: A Framework for Selecting Optimal Cost-Efficient LLM for Code-Generation Based on CoT Length
Research Track
Junhang Cheng Beihang University, Fang Liu Beihang University, Chengru Wu Beihang University, Li Zhang Beihang University
12:45
15m
Talk
Lightweight Probabilistic Coverage Metrics for Efficient Testing of Deep Neural Networks
Research Track
Yining Yin Nanjing University, Yang Feng Nanjing University, Shihao Weng Nanjing University, Xinyu Gao , Jia Liu Nanjing University, Zhihong Zhao Nanjing University
13:00 - 14:00
13:00
60m
Lunch
Lunch
Research Track

14:00 - 15:30
Session5: Software Vulnerability and Security IINew Idea Track / Research Track at Cosmos 3A
Chair(s): Chuanyi Li Nanjing University
14:00
15m
Talk
Devmp: A Virtual Instruction Extraction Method for Commercial Code Virtualization Obfuscators
Research Track
Shenqianqian Zhang Key Laboratory of Cyberspace Security, Ministry of Education, Weiyu Dong Information Engineering University, Jian Lin Information Engineering University
14:15
15m
Talk
Line-level Semantic Structure Learning for Code Vulnerability Detection
Research Track
Ziliang Wang Peking University, Ge Li Peking University, Jia Li Peking University, Yihong Dong Peking University, Yingfei Xiong Peking University, Zhi Jin Peking University
14:30
15m
Talk
SLVHound: Static Detection of Session Lingering Vulnerabilities in Modern Java Web ApplicationsACM SIGSOFT  Distinguished Paper Award
Research Track
Haining Meng SKLP, Institute of Computing Technology, CAS, China; University of Chinese Academy of Sciences, China, Jie Lu SKLP, Institute of Computing Technology, CAS, China; University of Chinese Academy of Sciences, China, Yongheng Huang Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:45
15m
Talk
Def-VAE: Identifying Adversarial Inputs with Robust Latent Representations
Research Track
Chengye Li Institute of Software, Chinese Academy of Sciences, Changshun Wu Université Grenoble Alpes, Rongjie Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
15:00
15m
Talk
Fuzzing for Stateful Protocol Programs Based on Constraints between States and Message Types
Research Track
Kunpeng Jian Institute of Information Engineering, Chinese Academy of Sciences, Yanyan Zou Institute of Information Engineering, Chinese Academy of Sciences, Menghao Li Institute of Information Engineering, Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences
15:15
10m
Talk
PriceSleuth: Detecting DeFi Price Manipulation Attacks in Smart Contracts Using LLM and Static Analysis
New Idea Track
Hao Wu Xi'an JiaoTong University, Haijun Wang Xi’an Jiaotong University, Shangwang Li Xi'an Jiaotong University, Yin Wu Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Yitao Zhao Yunnan Power Grid Co., Ltd, Ting Liu Xi'an Jiaotong University
14:00 - 15:30
Session8: Software Vulnerability and Security IIIResearch Track / New Idea Track / Tool Demonstration Track at Cosmos 3C
Chair(s): Xiaoyuan Xie Wuhan University
14:00
15m
Talk
VDLS: A Vulnerability Detection Approach Based on Execution Path Selection
Research Track
Xuanyan Zhu Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Yixuan Tang Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics, Jiayi Li Nanjing University of Aeronautics and Astronautics, Han Luo Nanjing University of Aeronautics and Astronautics, Jiaqi Liu National Key Laborarory on Test Physics & Numerical Mathematics
14:15
15m
Talk
Exploring Typo Squatting Threats in the Hugging Face Ecosystem
Research Track
Ningyuan Li Beijing University of Technology, Yanjie Zhao Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Zehao Wu Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
14:30
15m
Talk
Unraveling the Characterization and Propagation of Security Vulnerabilities in TensorFlow-based Deep Learning Software Supply Chain
Research Track
Yiren Zhou Nanjing University of Aeronautics and Astronautics, Lina Gong Nanjing University of Aeronautics and Astronautic, Tiantian Ma Nanjing University of Aeronautics and Astronautics
File Attached
14:45
15m
Talk
Seeing is (Not) Believing: The Mirage Card Attack Targeting Online Social Networks
Research Track
Wangchenlu Huang Beijing university of posts and telecommunications, Shenao Wang Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Tianxiang Wang China United Network Communications Group Corporation Limited, Yuhao Gao China United Network Communications Group Corporation Limited, Guosheng Xu Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology
15:00
10m
Talk
ETrace : Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis
New Idea Track
Chenyang Peng Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University, Yin Wu Xi'an Jiaotong University, Hao Wu Xi'an JiaoTong University, Ming Fan Xi'an Jiaotong University, Yitao Zhao Yunnan Power Grid Co., Ltd, Ting Liu Xi'an Jiaotong University
15:10
10m
Talk
A Natural Language Guided Adaptive Model-based Testing Tool for Autonomous Driving
Tool Demonstration Track
Man Zhang Beihang University, China, Shi Yize Nanjing University of Aeronautics and Astronautics, Tao Yue Beihang University
15:20
10m
Talk
Software Reuse in the Generative AI Era: From Cargo Cult Towards Systematic PracticesBest New Idea Paper Award
New Idea Track
Tommi Mikkonen University of Jyväskylä, Antero Taivalsaari Nokia Technologies
15:30 - 16:00
Coffee BreakResearch Track
15:30
30m
Break
Coffee Break
Research Track

16:00 - 17:30
Session6: AI for Software Engineering IIResearch Track at Cosmos 3A
Chair(s): Xing Hu Zhejiang University
16:00
15m
Talk
Beyond Isolated Changes: A Context-aware and Dependency-enhanced Code Change Detection Method
Research Track
Binghe Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zijun Wang Northwest University, Mengjie Sun Xi’an Jiaotong University, Haijun Wang Xi’an Jiaotong University
16:15
15m
Talk
Orion: A Multi-Agent Framework for Optimizing RAG Systems through Specialized Agent Collaboration
Research Track
xianxing fang Xidian University, Liangru Xie Xidian University, Weibin Yang Xidian University, Tianyi Zhang Xidian University, Zhang Ruitao Xi’an Jiaotong-Liverpool University, Hao Wang Xidian University, Di Wu Norwegian University of Science and Technology, Yushan Pan Xi'an Jiaotong-Liverpool University
16:30
15m
Talk
GPT Store Mining and Analysis
Research Track
Dongxun Su Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Xinyi Hou Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
16:45
15m
Talk
Mining Discriminative Issue Resolution Temporal Sequential Patterns in Open Source Software Repositories
Research Track
YaxinWang Nanjing University, Liang Wang Nanjing University, Hao Hu Nanjing University, Xianping Tao Nanjing University
17:00
15m
Talk
Generating SysML Behavior Models via Large Language Models: an Empirical Study
Research Track
Yuan Wang School of Software, Beihang University, Ning Ge School of Software, Beihang University, Jiangxi Liu Beihang University, Zhilong Cao Beihang University, Zheping Chen Beihang University, Chunming Hu Beihang University
17:15
15m
Talk
FIRE: Smart Contract Bytecode Function Identification via Graph-Refined Hybrid Feature Encoding
Research Track
Yu Sun Zhejiang University, Lingfeng Bao Zhejiang University, Xiaohu Yang Zhejiang University
16:00 - 17:30
Session9: AloT & MicroservicesResearch Track / Tool Demonstration Track at Cosmos 3C
Chair(s): Qingkai Shi Nanjing University
16:00
15m
Talk
EnvGuard: Guaranteeing Environment-Centric Safety and Security Properties in Web of Things System
Research Track
Bingkun Sun Fudan University, Jialin Ren Fudan University, Juntao Luo Fudan University, Liwei Shen Fudan University, Yongqiang Lu Fudan University, Qicai Chen Fudan University, China, Zhen Dong Fudan University, Xin Peng Fudan University
16:15
15m
Talk
Intelligent Traffic Engineering for IoT Networks: A Multi-Agent Deep Reinforcement Learning Approach
Research Track
liu ze song , zesong liu North China University of Technology, shanshan he North China University of Technology, Yuanhao Xi Liaoning Technical University, Ramin Yahyapour Liaoning Technical University
16:30
15m
Talk
Privacy-Preserving Authentication Scheme for V2G in social IoT Based on Certificateless Aggregate Signatures
Research Track
Zhuoqun Xia Changsha University of Science and Technology, Xin Wang Changsha University of Science and Technology
16:45
15m
Talk
To Split or to Merge? Exploring Multi-modal Data Flexibly for Failure Classification in Microservices
Research Track
Xiuhong Tan Changsha University of Science and Technology, China, Tongqing Zhou National University of Defense Technology, China, Yuan Yuan National University of Defense Technology, China, Shiming He Changsha University of Science and Technology, China, Yuqi Li National Supercomputer Center in Tianjin, Jian Zhang National Supercomputer Center in Tianjin
17:00
15m
Talk
Dynamic Microservice Resource Optimization Management Based on MAPE Loop
Research Track
Lu Wang Xidian University, Xu Fan Xidian University, Yaxiao Li , Quanwei Du Xidian University, Jialuo She Xidian University, Qingshan Li Xidian University
17:15
10m
Talk
Documenting Microservice Integration with MSAdoc
Tool Demonstration Track
Georg-Daniel Schwarz Friedrich-Alexander-Universität Erlangen-Nürnberg, Dirk Riehle U of Erlangen
19:00 - 19:30
20:00 - 22:00
Conference BanquetResearch Track at Tollbua

Sun 22 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

09:00 - 10:30
Future of Internetware Workshop IFuture of Internetware Workshop at Cosmos 3A
09:00
50m
Keynote
Invited Talk 1: Automated Testing and Safety Analysis of Deep Neural Networks
Future of Internetware Workshop
Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
10:30 - 11:00
Coffee BreakResearch Track
10:30
30m
Break
Coffee Break
Research Track

11:00 - 13:00
Future of Internetware Workshop IIFuture of Internetware Workshop at Cosmos 3A
11:00
50m
Keynote
Invited Talk 2: Efficient and Green Code LLMs: Happier Software Engineers, Happier Planet
Future of Internetware Workshop
David Lo Singapore Management University
11:50
50m
Keynote
Invited Talk 3: Reinventing Testing for Big Data and Heterogeneous Computing
Future of Internetware Workshop
Miryung Kim UCLA and Amazon Web Services
13:00 - 14:00
13:00
60m
Lunch
Lunch
Research Track

14:00 - 15:30
Future of Internetware Workshop IIIFuture of Internetware Workshop at Cosmos 3A
14:00
50m
Keynote
Invited Talk 4: Combatting Software Sprawl with LLMs
Future of Internetware Workshop
Earl T. Barr University College London
14:50
50m
Keynote
Invited Talk 5: Empowering Cloud Intelligence (AIOps) with LLMs: Advances, Learnings, and Beyond
Future of Internetware Workshop
Dongmei Zhang Microsoft
15:30 - 16:00
Coffee BreakResearch Track
15:30
30m
Break
Coffee Break
Research Track

16:00 - 17:30
Future of Internetware Workshop IVFuture of Internetware Workshop at Cosmos 3A
16:00
50m
Keynote
Invited Talk 6: TBD
Future of Internetware Workshop
Shin Hwei Tan Concordia University
16:50
50m
Keynote
Invited Talk 7: Testing Cyber-Physical Systems with AI Foundation Models
Future of Internetware Workshop
Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University

Call for Papers

The Internetware 2025 Tool Demonstration Track invites researchers and practitioners to present and explore the latest advancements, challenges, and practical experiences in the development of innovative tools, data, and artifacts across a broad range of fields. Submissions should focus on novel early-stage tool prototypes or new aspects of mature tools, ideally including open-sourced code/data and, optionally, live demonstrations. Authors of regular research papers are encouraged to submit complementary demonstration papers to further showcase and extend their contributions.

Best Tool Demo Award

The Internetware’25 Best Tool Demo Award will be presented to recognize authors for their efforts in creating and sharing outstanding tool demonstrations.

Formatting and Submission Guidelines

  • Submissions must not exceed 4 pages, including bibliography.

  • All submissions must be written in English and submitted in PDF format.

  • Submissions must use the ACM Sigconf template, available on the ACM Proceedings Template page​​ with the following header: \documentclass[sigconf, review]{acmart} \acmConference[Internetware ’25 - Tool Demonstration Track]{2025 16th International Conference on Internetware, Tool Demonstration Track}{June 20–22, 2025}{Trondheim, Norway}

  • Papers must be submitted through the Internetware 2025 submission site by the deadlines provided.

  • The tool demonstration track does not follow a double-blind review process. If submitting a tool demo alongside a double-blind research paper, authors should inform the Tool Demonstration Track Chairs to ensure independent review processes.

Important Dates

  • Submission Deadline: March 17, 2025

  • Notification of Acceptance: April 7, 2025

  • Camera-Ready Submission Deadline: April 20, 2025

Note: All deadlines are in AoE (Anywhere on Earth, UTC-12).

Evaluation Criteria

Each submission will be evaluated on the following quality criteria:

  • Significance: The extent to which the contribution impacts the field of software engineering, including any assumptions made.

  • Novelty: The originality of the contributions compared to the state-of-the-art.

  • Presentation: The clarity of the writing, the quality of figures and tables, and adherence to the formatting guidelines.

  • Verifiability: The extent to which the submission provides sufficient detail to replicate or verify the innovation, including data, analysis, and tool functionality.

Tools and Data Availability

To promote replicability and transparency, submissions must make associated datasets publicly available. Tools should also be open-sourced whenever possible, and distributed under an open-source license. If public availability is not feasible, authors must clearly explain the reasons.

Authors are encouraged to provide their demonstration in an easily accessible format, such as:

  • Virtual machine images, software containers (e.g., Docker), or system configurations (e.g., Puppet, Ansible).

  • Screencasts highlighting the tool’s functionality and use. Links to these screencasts can be submitted as an appendix to accompany the paper.

Conference Attendance

If a submission is accepted, at least one author of the paper is required to register for and attend the full 3-day technical conference and present the paper. The presentation is expected to be delivered in person.

We look forward to your submissions and seeing you at Internetware 2025!