ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
ModalityNameEmailPaper Title
2
In-PersonJihyeok Parkjihyeok_park@korea.ac.krFeature-Sensitive Coverage for Conformance Testing of Programming Language Implementations
3
In-PersonIke Mulderme@ikemulder.nlBeyond Backtracking: Connections in Fine-Grained Concurrent Separation Logic
4
In-PersonMark Niklas Müllermark.mueller@inf.ethz.chAbstract Interpretation of Fixpoint Iterators with Applications to Neural Networks
5
In-PersonThomas Sewelltals4@cam.ac.ukCakes that Bake Cakes: Dynamic Computation in CakeML
6
In-PersonMartin Elsmanmael@di.ku.dkParallelism in a Region Inference Context
7
In-PersonShankara Pailoorspailoor@cs.utexas.eduAutomated Detection of Under-Constrained Circuits in Zero-Knowledge Proofs
8
In-PersonMartin Elsmanmael@di.ku.dkGarbage-Collection Safety for Region-Based Type-Polymorphic Programs
9
In-PersonDragana Milovancevicdragana.milovancevic@epfl.chProving and Disproving Equivalence of Functional Programming Assignments
10
In-PersonXiaojia Raoxiaojia.rao19@imperial.ac.ukIris-Wasm: Robust and Modular Verification of WebAssembly Programs
11
In-PersonYongho Yoonyhyoon@ropas.snu.ac.krInductive Program Synthesis via Iterative Forward-Backward Abstract Interpretation
12
In-PersonTimothy Alberdingk Thijmtthijm@cs.princeton.eduModular Control Plane Verification via Temporal Invariants
13
In-PersonPeter Thiemannthiemann@informatik.uni-freiburg.deParameterized Algebraic Protocols
14
In-PersonHünkar Can Tunçtunc@cs.au.dkOptimal Reads-From Consistency Checking for C11-Style Memory Models
15
In-PersonAlex Bagnallabagnalla@gmail.comFormally Verified Samplers From Probabilistic Programs With Loops and Conditioning
16
In-PersonHünkar Can Tunçtunc@cs.au.dkSound Dynamic Deadlock Prediction in Linear Time
17
In-PersonShamiek Mangipudishamiekm@gmail.com"Generalized Policy-Based Noninterference for Efficient Confidentiality-Preservation
18
In-PersonMarco Eilersmarco.eilers@inf.ethz.chCommCSL: Proving Information Flow Security for Concurrent Programs using Abstract Commutativity
19
In-PersonNariyoshi Chidanariyoshichidamm@gmail.comRepairing Regular Expressions for Extraction
20
In-PersonOlivier Tardieutardieu@us.ibm.comReliable Actors with Retry Orchestration
21
In-PersonTetsuro Yamazakiyamazaki@csg.ci.i.u-tokyo.ac.jpCollecting cyclic garbage across foreign function interfaces
22
In-PersonZiyang Liliby99@seas.upenn.eduScallop, a Language for Neurosymbolic Programming
23
In-PersonTom Yuvilertom.yuviler@campus.technion.ac.ilOne Pixel Adversarial Attacks via Sketched Programs
24
In-PersonZachary Siscozsisco@ucsb.eduLoop Rerolling For Hardware Decompilation
25
In-PersonNoah Bertramnbertram@cs.cornell.eduCutting the Cake: A Language for Fair Division
26
In-PersonKyeongmin Chokyeongmin.cho@kaist.ac.krMemento: A Framework for Detectable Recoverability in Persistent Memory
27
In-PersonMartin Bergercontact@martinfriedrichberger.netSearch-Based Regular Expression Inference on a GPU
28
In-PersonShubham Ugareshubhamdugare@gmail.comIncremental Verification of Neural Networks
29
In-PersonQianchuan Yeye202@purdue.eduTaype: A Policy-Agnostic Language for Oblivious Computation
30
In-PersonJohn Lili.john@northeastern.eduLilac: a Modal Separation Logic for Conditional Probability
31
In-PersonDongjae Leedongjae.lee@sf.snu.ac.krFair Operational Semantics
32
In-PersonAmanda Xuaxu44@wisc.eduSynthesizing Quantum-Circuit Optimizers
33
In-PersonJuneyoung Leelebjuney@amazon.comHEaaN.MLIR: An Optimizing Compiler for Fast Ring-based Homomorphic Encryption
34
In-PersonMohamed Tarek Ibn Ziadmtarek@nvidia.comcuCatch: A Debugging Tool for Efficiently Catching Memory Safety Violations in CUDA Applications
35
In-PersonJacob Prinzjacobeliasprinz@gmail.comMerging Inductive Relations
36
In-PersonAndres Goensandres.goens@ed.ac.ukCompound Memory Models
37
In-PersonKekewangad@gmail.comDiscrete Adversarial Attack to Models of Code
38
In-PersonSankha Narayan Guriasankha@cs.umd.eduAbsynthe: Abstract Interpretation-Guided Synthesis
39
In-PersonRachit Nigamrnigam@cs.cornell.eduModular Hardware Design with Timeline Types
40
In-PersonJatin Arorajatina@andrew.cmu.eduEfficient Parallel Functional Programming with Effects
41
In-PersonCeleste Barnabycelestebarnaby@gmail.comImageEye: Batch Image Processing using Program Synthesis
42
In-PersonJialun Zhangjjz5354@psu.eduInterval Parsing Grammars for File Format Parsing
43
In-PersonManya Bansalmanya227@stanford.eduMosaic: An Interoperable Compiler for Tensor Algebra
44
In-PersonLucas Wilkinsonwilkinson.lucas@gmail.comRegister Tiling for Unstructured Sparsity in Neural Network Inference
45
In-PersonTony Nuda Zhangnudzhang@umich.eduPerformal: Formal Verification of Latency Properties for Distributed Systems
46
In-PersonVsevolod Livinskiivlivinsk@cs.utah.eduFuzzing Loop Optimizations in Compilers for C++ and Data-Parallel Languages
47
In-PersonMargus Veanesmargus@microsoft.comDerivative Based Nonbacktracking Real-World Regex Matching with Backtracking Semantics
48
In-PersonLauren Picklaurenmpick@gmail.comPsym: Efficient Symbolic Exploration of Distributed Systems
49
RemoteEnde Jinende.jin@uwaterloo.caExtensible Metatheory Mechanization via Family Polymorphism
50
In-PersonJoel Kuepperjoel.kuepper@adelaide.edu.auVerified Compilation with Randomized Program Search for Cryptographic Primitives
51
In-PersonJoseph Tassarottijt4767@nyu.eduVerified Density Compilation for a Probabilistic Programming Language
52
In-PersonKiran Gopinathankirang@comp.nus.edu.sgMostly-Automated Proof Repair for Verified Libraries
53
In-PersonYihong Zhangyz489@cs.washington.eduBetter Together: Unifying Datalog and Equality Saturation
54
In-PersonSung-Hwan Leesunghwan.lee@sf.snu.ac.krPutting Weak Memory in Order via a Promising Intermediate Representation
55
In-PersonAlex Lewalexlew@mit.eduProbabilistic Programming with Stochastic Probabilities
56
In-PersonSebastian Wolffsebastian.wolff@nyu.eduEmbedding Hindsight Reasoning in Separation Logic
57
In-PersonWenjie Ma191250103@smail.nju.edu.cnContext Sensitivity without Contexts: A Cut-Shortcut Approach to Fast and Precise Pointer Analysis
58
In-PersonHrutvik Kanabarhk324@kent.ac.ukPureCake: A Verified Compiler for a Lazy Functional Language
59
In-PersonJonas Fialajonas.fiala@inf.ethz.chLeveraging Rust Types for Program Synthesis
60
In-PersonJeremy Yallopjeremy.yallop@cl.cam.ac.ukflap: A Deterministic Parser with Fused Lexing
61
In-PersonQirun Zhangqrzhang@gatech.eduRecursive State Machine Guided Graph Folding for Context-Free Language Reachability
62
In-PersonAlastair Donaldsonalastair.donaldson@imperial.ac.ukProgram Reconditioning: Avoiding Undefined Behaviour When Finding and Reducing Compiler Bugs
63
In-PersonDan Cascavalcascaval@cs.washington.eduA Lineage-Based Referencing DSL for Computer-Aided Design
64
In-PersonGeorg Mosergeorg.moser@uibk.ac.atAutomated Expected Value Analysis of Recursive Programs
65
In-PersonZhe Taozhetao@ucdavis.eduArchitecture-Preserving Provable Repair of Deep Neural Networks
66
In-PersonSurendra Ghentiyalasg974@cornell.eduObtaining Information Leakage Bounds via Approximate Model Counting
67
In-PersonJingbo Wangjingbow@usc.eduSynthesizing MILP Constraints for Efficient and Robust Optimization
68
In-PersonBenjamin Driscoll and William Brandonbdrisc@stanford.eduBetter Defunctionalization through Lambda Set Specialization
69
In-PersonYongwei Yuanyuan311@purdue.eduTrace-Guided Inductive Synthesis of Recursive Functional Programs
70
In-PersonLuca Beurer-Kellnerluca.beurer-kellner@inf.ethz.chProgramming Large Language Models
71
In-PersonMaja Trelamaja.ada0@gmail.comWasmRef-Isabelle: a Verified Monadic Interpreter and Industrial Fuzzing Oracle for WebAssembly
72
In-PersonStefan Mullersmuller2@iit.eduResponsive Parallelism with Synchronization
73
In-PersonYu-Fang Chenyfc@iis.sinica.edu.tw An Automata-based Framework for Verification and Bug Hunting in Quantum Circuits
74
In-PersonSurendra Ghentiyalasg974@cornell.eduObtaining Information Leakage Bounds via Approximate Model Counting
75
In-PersonEnrique Román-Calvocalvo@irif.frDynamic Partial Order Reduction for Checking Correctness Against Transaction Isolation Levels
76
In-PersonRaphael Isemannteemperor@gmail.comDon’t Look UB: Exposing Sanitizer-Eliding Compiler Optimizations
77
In-PersonZongyuan Liuzy.liu@cs.au.dk
VMSL: A Separation Logic for Mechanised Robust Safety of Virtual Machines Communicating above FF-A
78
In-PersonJunrui Liujunrui@ucsb.eduConflict-Driven Synthesis for Layout Engines
79
In-PersonMilijana Surbatovichmilijans@andrew.cmu.eduA Type System for Safe Intermittent Computing
80
RemoteNikita Kovalndkoval@ya.ruCQS: A Formally-Verified Framework for Fair Abortable Synchronization in Kotlin Coroutines
81
In-PersonPascal Weisenburgerpascal.weisenburger@unisg.chType-Checking CRDT Convergence
82
In-PersonAndres Goensandres.goens@ed.ac.ukCompound Memory Models
83
RemoteYulong Huangyh419@cam.ac.ukDefunctionalization with Dependent Types
84
In-PersonNico Lehmannnlehmann@ucsd.eduFlux: Liquid Types for Rust
85
In-PersonZhe Zhouzhou956@purdue.eduCovering All the Bases: Type-Based Verification of Test Input Generators
86
In-PersonTetsuro Yamazakiyamazaki@csg.ci.i.u-tokyo.ac.jpCollecting Cyclic Garbage across Foreign Function Interfaces
87
In-PersonScott Kovachdskovach@stanford.eduIndexed Streams: A Formal Intermediate Representation for Fused Contraction Programs
88
In-PersonAdithya Muraliadithya5@illinois.eduModel-guided synthesis of inductive lemmas for FOL with least fixpoints
89
In-PersonHaoze Wuhaozewu@stanford.eduScalable Verification of GNN-based Job Schedulers
90
In-PersonJacob Laureljlaurel2@illinois.eduA general construction for abstract interpretation of higher-order automatic differentiation
91
In-PersonRunzhou Taorunzhou.tao@columbia.eduGleipnir: toward practical error analysis for Quantum programs
92
In-PersonYao Liiyao@pdx.eduProgram Adverbs and Tlön Embeddings
93
In-PersonAlex Sanchez-Sternsanchezstern@cs.umass.eduPassport: Improving Automated Formal Verification Using Identifiers
94
95
96
97
98
99
100