default search action
32nd ISSTA 2023: Seattle, WA, USA
- René Just, Gordon Fraser:
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023. ACM 2023
Papers
- Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo:
CydiOS: A Model-Based Testing Framework for iOS Apps. 1-13 - Fuqi Jia, Rui Han, Pei Huang, Minghao Liu, Feifei Ma, Jian Zhang:
Improving Bit-Blasting for Nonlinear Integer Constraints. 14-25 - Yangruibo Ding, Saikat Chakraborty, Luca Buratti, Saurabh Pujar, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray:
CONCORD: Clone-Aware Contrastive Learning for Source Code. 26-38 - Ensheng Shi, Yanlin Wang, Hongyu Zhang, Lun Du, Shi Han, Dongmei Zhang, Hongbin Sun:
Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and Beyond. 39-51 - Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). 52-63 - Zhiqiang Zang, Aditya Thimmaiah, Milos Gligoric:
Pattern-Based Peephole Optimizations with Java JIT Tests. 64-75 - Michael Chesser, Surya Nepal, Damith C. Ranasinghe:
Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing. 76-88 - Tiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu, Bin Yuan, Deqing Zou, Hai Jin:
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree. 89-100 - Dongjie He, Yujiang Gui, Yaoqing Gao, Jingling Xue:
Reducing the Memory Footprint of IFDS-Based Data-Flow Analyses using Fine-Grained Garbage Collection. 101-113 - Jiangchao Liu, Jierui Liu, Peng Di, Diyu Wu, Hengjie Zheng, Alex X. Liu, Jingling Xue:
Hybrid Inlining: A Framework for Compositional and Context-Sensitive Static Analysis. 114-126 - Stephan Lipp, Daniel Elsner, Severin Kacianka, Alexander Pretschner, Marcel Böhme, Sebastian Banescu:
Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction. 127-139 - Matteo Kamm, Manuel Rigger, Chengyu Zhang, Zhendong Su:
Testing Graph Database Engines via Query Partitioning. 140-149 - Richard Schumi, Jun Sun:
Semantic-Based Neural Network Repair. 150-162 - Ziyue Hua, Wei Lin, Luyao Ren, Zongyang Li, Lu Zhang, Wenpin Jiao, Tao Xie:
GDsmith: Detecting Bugs in Cypher Graph Database Engines. 163-174 - Shiwen Yu, Ting Wang, Ji Wang:
Loop Invariant Inference through SMT Solving Enhanced Reinforcement Learning. 175-187 - Yihong Dong, Ge Li, Zhi Jin:
CODEP: Grammatical Seq2Seq Model for General-Purpose Code Generation. 188-198 - Zhiyu Fan, Shin Hwei Tan, Abhik Roychoudhury:
Concept-Based Automated Grading of CS-1 Programming Assignments. 199-210 - Yiu Wai Chow, Max Schäfer, Michael Pradel:
Beware of the Unexpected: Bimodal Taint Analysis. 211-222 - Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He, Xianhao Liao, Ke Wang, Jinku Li, Zhan Qin:
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity. 223-235 - Muhammad Numair Mansur, Valentin Wüstholz, Maria Christakis:
Dependency-Aware Metamorphic Testing of Datalog Engines. 236-247 - Haoyang Ma, Qingchao Shen, Yongqiang Tian, Junjie Chen, Shing-Chi Cheung:
Fuzzing Deep Learning Compilers with HirGen. 248-260 - Lei Cui, Jiancong Cui, Yuede Ji, Zhiyu Hao, Lun Li, Zhenquan Ding:
API2Vec: Learning Representations of API Sequences for Malware Detection. 261-273 - Dan Bruce, David A. Kelly, Héctor D. Menéndez, Earl T. Barr, David Clark:
June: A Type Testability Transformation for Improved ATG Performance. 274-284 - Han Liu, Sen Chen, Ruitao Feng, Chengwei Liu, Kaixuan Li, Zhengzi Xu, Liming Nie, Yang Liu, Yixiang Chen:
A Comprehensive Study on Quality Assurance Tools for Java. 285-297 - Mingxi Ye, Yuhong Nan, Zibin Zheng, Dongpeng Wu, Huizhong Li:
Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing. 298-309 - Huizhong Guo, Jinfeng Li, Jingyi Wang, Xiangyu Liu, Dongxia Wang, Zehong Hu, Rong Zhang, Hui Xue:
FairRec: Fairness Testing for Deep Recommender Systems. 310-321 - Chaofan Shou, Shangyin Tan, Koushik Sen:
ItyFuzz: Snapshot-Based Fuzzer for Smart Contract. 322-333 - Kaibo Liu, Yudong Han, Jie M. Zhang, Zhenpeng Chen, Federica Sarro, Mark Harman, Gang Huang, Yun Ma:
Who Judges the Judge: An Empirical Study on Online Judge Tests. 334-346 - Zifan Xie, Ming Wen, Haoxiang Jia, Xiaochen Guo, Xiaotong Huang, Deqing Zou, Hai Jin:
Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation. 347-359 - Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun:
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. 360-372 - Shuo Yang, Jiachi Chen, Zibin Zheng:
Definition and Detection of Defects in NFT Smart Contracts. 373-384 - Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. 385-397 - Golnaz Gharachorlu, Nick Sumner:
Type Batched Program Reduction. 398-410 - Zhaoxu Zhang, Robert Winn, Yu Zhao, Tingting Yu, William G. J. Halfond:
Automatically Reproducing Android Bug Reports using Natural Language Processing and Reinforcement Learning. 411-422 - Yinlin Deng, Chunqiu Steven Xia, Haoran Peng, Chenyuan Yang, Lingming Zhang:
Large Language Models Are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models. 423-435 - Zhibo Liu, Dongwei Xiao, Zongjie Li, Shuai Wang, Wei Meng:
Exploring Missed Optimizations in WebAssembly Optimizers. 436-448 - Carl Hildebrandt, Meriel von Stein, Sebastian G. Elbaum:
PhysCov: Physical Test Coverage for Autonomous Vehicles. 449-461 - Xudong Zhang, Yan Cai:
Building Critical Testing Scenarios for Autonomous Driving from Real Accidents. 462-474 - Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement. 475-487 - Mingfei Cheng, Yuan Zhou, Xiaofei Xie:
BehAVExplor: Behavior Diversity Guided Testing for Autonomous Driving Systems. 488-500 - Shenglin Bao, Chaofeng Sha, Bihuan Chen, Xin Peng, Wenyun Zhao:
In Defense of Simple Techniques for Neural Network Test Case Selection. 501-513 - Huaxun Huang, Chi Xu, Ming Wen, Yepang Liu, Shing-Chi Cheung:
ConfFix: Repairing Configuration Compatibility Issues in Android Apps. 514-525 - Tianchang Gao, Junjie Chen, Yingquan Zhao, Yuqun Zhang, Lingming Zhang:
Vectorizing Program Ingredients for Better JVM Testing. 526-537 - Linlin Li, Ruifeng Wang, Xian Zhan, Ying Wang, Cuiyun Gao, Sinan Wang, Yepang Liu:
What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile Applications. 538-550 - Yingquan Zhao, Junjie Chen, Ruifeng Fu, Haojie Ye, Zan Wang:
Testing the Compiler for a New-Born Programming Language: An Industrial Case Study (Experience Paper). 551-563 - William Eiers, Ganesh Sankaran, Tevfik Bultan:
Quantitative Policy Repair for Access Control on the Cloud. 564-575 - Wenxuan Wang, Jingyuan Huang, Chang Chen, Jiazhen Gu, Jianping Zhang, Weibin Wu, Pinjia He, Michael R. Lyu:
Validating Multimedia Content Moderation Software via Semantic Fusion. 576-588 - Zhongxin Liu, Kui Liu, Xin Xia, Xiaohu Yang:
Towards More Realistic Evaluation for Neural Test Oracle Generation. 589-600 - Jun Wang, Yanhui Li, Xiang Huang, Lin Chen, Xiaofang Zhang, Yuming Zhou:
Back Deduction Based Testing for Word Sense Disambiguation Ability of Machine Translation Systems. 601-613 - Simin Chen, Shiyi Wei, Cong Liu, Wei Yang:
DyCL: Dynamic Neural Network Compilation Via Program Rewriting and Graph Optimization. 614-626 - Chengpeng Li, Mohammad Mahdi Khosravi, Wing Lam, August Shi:
Systematically Producing Test Orders to Detect Order-Dependent Flaky Tests. 627-638 - Lei Bu, Qiuping Zhang, Suwan Li, Jinglin Dai, Guangdong Bai, Kai Chen, Xuandong Li:
Security Checking of Trigger-Action-Programming Smart Home Integrations. 639-651 - Sihan Xu, Ya Gao, Lingling Fan, Linyu Li, Xiangrui Cai, Zheli Liu:
LiResolver: License Incompatibility Resolution for Open Source Software. 652-663 - Yu Liu, Jiyang Zhang, Pengyu Nie, Milos Gligoric, Owolabi Legunsen:
More Precise Regression Test Selection via Reasoning about Semantics-Modifying Changes. 664-676 - Chen Yang, Junjie Chen, Xingyu Fan, Jiajun Jiang, Jun Sun:
Silent Compiler Bug De-duplication via Three-Dimensional Analysis. 677-689 - Jingyi Shi, Yang Xiao, Yuekang Li, Yeting Li, Dongsong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo:
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators. 690-702 - Yuhao Zhou, Wei Song:
DDLDroid: Efficiently Detecting Data Loss Issues in Android Apps. 703-714 - Hang Du, Vijay Krishna Palepu, James A. Jones:
To Kill a Mutant: An Empirical Study of Mutation Testing Kills. 715-726 - Pengcheng Fang, Zhenhua Zou, Xusheng Xiao, Zhuotao Liu:
iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements. 727-739 - Hao Liu, Yanlin Wang, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, Rongrong Ji:
RefBERT: A Two-Stage Pre-trained Framework for Automatic Rename Refactoring. 740-752 - Quan Zhang, Yongqiang Tian, Yifeng Ding, Shanshan Li, Chengnian Sun, Yu Jiang, Jiaguang Sun:
CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems. 753-765 - Boxi Yu, Zhiqing Zhong, Jiaqi Li, Yixing Yang, Shilin He, Pinjia He:
ROME: Testing Image Captioning Systems via Recursive Object Melting. 766-778 - Reese Levine, Mingun Cho, Devon McKee, Andrew Quinn, Tyler Sorensen:
GPUHarbor: Testing GPU Memory Consistency at Large (Experience Paper). 779-791 - Yichen He, Liran Wang, Kaiyi Wang, Yupeng Zhang, Hang Zhang, Zhoujun Li:
COME: Commit Message Generation with Modification Embedding. 792-803 - Chengbin Pang, Tiantai Zhang, Xuelan Xu, Linzhang Wang, Bing Mao:
OCFI: Make Function Entry Identification Hard Again. 804-815 - Yiyu Zhang, Tianyi Liu, Zewen Sun, Zhe Chen, Xuandong Li, Zhiqiang Zuo:
Catamaran: Low-Overhead Memory Safety Enforcement via Parallel Acceleration. 816-828 - Yisong Xiao, Aishan Liu, Tianlin Li, Xianglong Liu:
Latent Imitator: Generating Natural Individual Discriminatory Instances for Black-Box Fairness Testing. 829-841 - Changwen Li, Joseph Sifakis, Qiang Wang, Rongjie Yan, Jian Zhang:
Simulation-Based Validation for Autonomous Driving Systems. 842-853 - Youngjae Kim, Seungheon Han, Askar Yeltayuly Khamit, Jooyong Yi:
Automated Program Repair from Fuzzing Perspective. 854-866 - Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen, Chao Zhang:
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing. 867-879 - Sungmin Kang, Wonkeun Choi, Shin Yoo:
A Bayesian Framework for Automated Debugging. 880-891 - Daniel Lehmann, Michelle Thalakottur, Frank Tip, Michael Pradel:
That's a Tough Call: Studying the Challenges of Call Graph Construction for WebAssembly. 892-903 - Zihan Wang, Pengbo Nie, Xinyuan Miao, Yuting Chen, Chengcheng Wan, Lei Bu, Jianjun Zhao:
GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing. 904-916 - Yiming Zhang, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang:
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features. 917-928 - Vasudev Vikram, Isabella Laybourn, Ao Li, Nicole Nair, Kelton OBrien, Rafaello Sanna, Rohan Padhye:
Guiding Greybox Fuzzing with Mutation Testing. 929-941 - Xiaodong Zhang, Wei Zhao, Yang Sun, Jun Sun, Yulong Shen, Xuewen Dong, Zijiang Yang:
Testing Automated Driving Systems by Breaking Many Laws Efficiently. 942-953 - Tahereh Zohdinasab, Vincenzo Riccio, Paolo Tonella:
DeepAtash: Focused Test Generation for Deep Learning Systems. 954-966 - Chu Chen, Pinghong Ren, Zhenhua Duan, Cong Tian, Xu Lu, Bin Yu:
SBDT: Search-Based Differential Testing of Certificate Parsers in SSL/TLS Implementations. 967-979 - Zeqin Liao, Sicheng Hao, Yuhong Nan, Zibin Zheng:
SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis. 980-991 - Jiajun Hu, Lili Wei, Yepang Liu, Shing-Chi Cheung:
ωTest: WebView-Oriented Testing for Android Applications. 992-1004 - Mingyi Zhou, Xiang Gao, Jing Wu, John C. Grundy, Xiao Chen, Chunyang Chen, Li Li:
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems. 1005-1017 - Juan C. Alonso, Sergio Segura, Antonio Ruiz-Cortés:
AGORA: Automated Generation of Test Oracles for REST APIs. 1018-1030 - Max Eisele, Daniel Ebert, Christopher Huth, Andreas Zeller:
Fuzzing Embedded Systems using Debug Interfaces. 1031-1042 - He Su, Feng Li, Lili Xu, Wenbo Hu, Yujie Sun, Qing Sun, Huina Chao, Wei Huo:
Splendor: Static Detection of Stored XSS in Modern Web Applications. 1043-1054 - Pablo Valle, Aitor Arrieta, Maite Arratibel:
Applying and Extending the Delta Debugging Algorithm for Elevator Dispatching Algorithms (Experience Paper). 1055-1067 - Ziyad Alsaeed, Michal Young:
Finding Short Slow Inputs Faster with Grammar-Based Search. 1068-1079 - Yang Chen, Alperen Yildiz, Darko Marinov, Reyhaneh Jabbarvand:
Transforming Test Suites into Croissants. 1080-1092 - Tian Tan, Yue Li:
Tai-e: A Developer-Friendly Static Analysis Framework for Java by Harnessing the Good Designs of Classics. 1093-1105 - Xiangzhe Xu, Shiwei Feng, Yapeng Ye, Guangyu Shen, Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, Xiangyu Zhang:
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis. 1106-1118 - Tianxiao Wang, Chen Zhi, Xiaoqun Zhou, Jinjie Wu, Jianwei Yin, Shuiguang Deng:
Data Constraint Mining for Automatic Reconciliation Scripts Generation. 1119-1130 - Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
Guided Retraining to Enhance the Detection of Difficult Android Malware. 1131-1143 - Queping Kong, Jiachi Chen, Yanlin Wang, Zigui Jiang, Zibin Zheng:
DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols. 1144-1156 - Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, Lingxiao Jiang:
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts. 1157-1168 - Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo:
Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing. 1169-1181 - Zhiyi Xue, Si Liu, Zhaodi Zhang, Yiting Wu, Min Zhang:
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation. 1182-1194 - Juan Altmayer Pizzorno, Emery D. Berger:
SlipCover: Near Zero-Overhead Code Coverage for Python. 1195-1206 - Yannan Li, Jingbo Wang, Chao Wang:
Systematic Testing of the Data-Poisoning Robustness of KNN. 1207-1218 - Karine Even-Mendoza, Arindam Sharma, Alastair F. Donaldson, Cristian Cadar:
GrayC: Greybox Fuzzing of Compilers and Analysers for C. 1219-1231 - Myeongsoo Kim, Davide Corradini, Saurabh Sinha, Alessandro Orso, Michele Pasqua, Rachel Tzoref-Brill, Mariano Ceccato:
Enhancing REST API Testing with NLP Techniques. 1232-1243 - Yu Pan, Zhichao Xu, Levi Taiji Li, Yunhe Yang, Mu Zhang:
Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode. 1244-1256 - Yifan Mo, Jiachi Chen, Yanlin Wang, Zibin Zheng:
Toward Automated Detecting Unanticipated Price Feed in Smart Contract. 1257-1268 - Dhia Elhaq Rzig, Nafees Iqbal, Isabella Attisano, Xue Qin, Foyzul Hassan:
Virtual Reality (VR) Automated Testing in the Wild: A Case Study on Unity-Based VR Applications. 1269-1281 - Yi Wu, Nan Jiang, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan, Petr Babkin, Sameena Shah:
How Effective Are Neural Networks for Fixing Security Vulnerabilities. 1282-1294 - Seemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan:
Rare Path Guided Fuzzing. 1295-1306 - Piyus Kedia, Rahul Purandare, Udit Kumar Agarwal, Rishabh:
CGuard: Scalable and Precise Object Bounds Protection for C. 1307-1318 - Yiheng Xiong, Mengqian Xu, Ting Su, Jingling Sun, Jue Wang, He Wen, Geguang Pu, Jifeng He, Zhendong Su:
An Empirical Study of Functional Bugs in Android Apps. 1319-1331 - Jingyao Zhou, Lei Xu, Gongzheng Lu, Weifeng Zhang, Xiangyu Zhang:
NodeRT: Detecting Races in Node.js Applications Practically. 1332-1344 - Chao Li, Rui Chen, Boxiang Wang, Zhixuan Wang, Tingting Yu, Yunsong Jiang, Bin Gu, Mengfei Yang:
An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software. 1345-1356 - Abdoul Kader Kaboré, Earl T. Barr, Jacques Klein, Tegawendé F. Bissyandé:
CodeGrid: A Grid Representation of Code. 1357-1369 - Jian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu, Chunming Hu, Yang Liu:
Detecting Condition-Related Bugs with Control Flow Graph Neural Network. 1370-1382 - Ling Jiang, Hengchen Yuan, Qiyi Tang, Sen Nie, Shi Wu, Yuqun Zhang:
Third-Party Library Dependency for Large-Scale SCA in the C/C++ Ecosystem: How Far Are We? 1383-1395 - Jiradet Ounjai, Valentin Wüstholz, Maria Christakis:
Green Fuzzer Benchmarking. 1396-1406 - Yutao Hu, Suyuan Wang, Wenke Li, Junru Peng, Yueming Wu, Deqing Zou, Hai Jin:
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? 1407-1419