Abstract is missing.
- jTrans: jump-aware transformer for binary code similarity detectionHao Wang, Wenjie Qu, Gilad Katz, Wenyu Zhu, Zeyu Gao, Han Qiu 0008, Jianwei Zhuge, Chao Zhang. 1-13 [doi]
- FDG: a precise measurement of fault diagnosability gain of test casesGabin An, Shin Yoo. 14-26 [doi]
- TeLL: log level suggestions via modeling multi-level code block informationJiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, Zhenkai Liang. 27-38 [doi]
- An extensive study on pre-trained models for program understanding and generationZhengran Zeng, Hanzhuo Tan, Haotian Zhang, Jing Li, Yuqun Zhang, Lingming Zhang. 39-51 [doi]
- Metamorphic relations via relaxations: an approach to obtain oracles for action-policy testingHasan Ferit Eniser, Timo P. Gros, Valentin Wüstholz, Jörg Hoffmann 0001, Maria Christakis. 52-63 [doi]
- Hunting bugs with accelerated optimal graph vertex matchingXiaohui Zhang, Yuanjun Gong, Bin Liang, Jianjun Huang 0001, Wei You, Wenchang Shi, Jian Zhang. 64-76 [doi]
- Using pre-trained language models to resolve textual and semantic merge conflicts (experience paper)Jialu Zhang, Todd Mytkowicz, Mike Kaufman, Ruzica Piskac, Shuvendu K. Lahiri. 77-88 [doi]
- Combining solution reuse and bound tightening for efficient analysis of evolving systemsClay Stevens, Hamid Bagheri. 89-100 [doi]
- On the use of evaluation measures for defect prediction studiesRebecca Moussa, Federica Sarro. 101-113 [doi]
- Evolution-aware detection of order-dependent flaky testsChengpeng Li, August Shi. 114-125 [doi]
- ε-weakened robustness of deep neural networksPei Huang 0002, Yuting Yang 0002, Minghao Liu 0001, Fuqi Jia, Feifei Ma, Jian Zhang 0001. 126-138 [doi]
- Simple techniques work surprisingly well for neural network test prioritization and active learning (replicability study)Michael Weiss 0004, Paolo Tonella. 139-150 [doi]
- Improving cross-platform binary analysis using representation learning via graph alignmentGeunwoo Kim, Sanghyun Hong 0001, Michael Franz, Dokyung Song. 151-163 [doi]
- BET: black-box efficient testing for convolutional neural networksJialai Wang, Han Qiu 0008, Yi Rong, Hengkai Ye, Qi Li, Zongpeng Li, Chao Zhang. 164-175 [doi]
- DocTer: documentation-guided fuzzing for testing deep learning API functionsDanning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan 0001, Xiangyu Zhang, Michael W. Godfrey. 176-188 [doi]
- ASRTest: automated testing for deep-neural-network-driven speech recognition systemsPin Ji, Yang Feng, Jia Liu, Zhihong Zhao, Zhenyu Chen 0001. 189-201 [doi]
- AEON: a method for automatic evaluation of NLP test casesJen-Tse Huang, Jianping Zhang, Wenxuan Wang, Pinjia He, Yuxin Su 0001, Michael R. Lyu. 202-214 [doi]
- Human-in-the-loop oracle learning for semantic bugs in string processing programsCharaka Geethal Kapugama, Van-Thuan Pham, Aldeida Aleti, Marcel Böhme. 215-226 [doi]
- HybridRepair: towards annotation-efficient repair for deep learning modelsYu Li, Muxi Chen, Qiang Xu 0001. 227-238 [doi]
- Cross-lingual transfer learning for statistical type inferenceZhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li 0008, Yang Liu 0003. 239-250 [doi]
- Unicorn: detect runtime errors in time-series databases with hybrid input synthesisZhiyong Wu, Jie Liang, Mingzhe Wang, Chijin Zhou, Yu Jiang 0001. 251-262 [doi]
- On the use of mutation analysis for evaluating student test suite qualityJames Perretta, Andrew DeOrio, Arjun Guha, Jonathan Bell 0001. 263-275 [doi]
- Test mimicry to assess the exploitability of library vulnerabilitiesHong Jin Kang, Truong-Giang Nguyen, Bach Le, Corina S. Pasareanu, David Lo 0001. 276-288 [doi]
- Automated test generation for REST APIs: no time to rest yetMyeongSoo Kim, Qi Xin, Saurabh Sinha, Alessandro Orso. 289-301 [doi]
- Finding bugs in Gremlin-based graph database systems via Randomized differential testingYingying Zheng, Wensheng Dou, Yicheng Wang, Zheng Qin, Lei Tang, Yu Gao, Dong Wang, Wei Wang, Jun Wei 0001. 302-313 [doi]
- RegMiner: towards constructing a large regression dataset from code evolution historyXuezhi Song, Yun Lin 0001, Siang Hwee Ng, Yijian Wu, Xin Peng 0001, Jin Song Dong, Hong Mei. 314-326 [doi]
- One step further: evaluating interpreters using metamorphic testingMing Fan 0002, JiaLi Wei, Wuxia Jin, Zhou Xu 0003, Wenying Wei, Ting Liu 0002. 327-339 [doi]
- SnapFuzz: high-throughput fuzzing of network applicationsAnastasios Andronidis, Cristian Cadar. 340-351 [doi]
- Almost correct invariants: synthesizing inductive invariants by fuzzing proofsSumit Lahiri, Subhajit Roy. 352-364 [doi]
- SLIME: program-sensitive energy allocation for fuzzingChenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang 0005, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, Raheem Beyah. 365-377 [doi]
- MDPFuzz: testing models solving Markov decision processesQi Pang, Yuanyuan Yuan, Shuai Wang. 378-390 [doi]
- TensileFuzz: facilitating seed input generation in fuzzing via string constraint solvingXuwei Liu, Wei You, Zhuo Zhang 0002, Xiangyu Zhang 0001. 391-403 [doi]
- PrIntFuzz: fuzzing Linux drivers via automated virtual device simulationZheyu Ma, Bodong Zhao, Letu Ren, Zheming Li, Siqi Ma, Xiapu Luo, Chao Zhang. 404-416 [doi]
- Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulationYaowen Zheng, Yuekang Li, Cen Zhang, Hongsong Zhu, Yang Liu, Limin Sun. 417-428 [doi]
- Understanding device integration bugs in smart home systemTao Wang, Kangkang Zhang, Wei Chen, Wensheng Dou, Jiaxin Zhu, Jun Wei 0001, Tao Huang. 429-441 [doi]
- A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmwareBinbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian 0001, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang 0005, Changting Lin, JingZheng Wu, Raheem Beyah. 442-454 [doi]
- Deadlock prediction via generalized dependencyJinpeng Zhou, Hanmei Yang, John Lange, Tongping Liu. 455-466 [doi]
- Automated testing of image captioning systemsBoxi Yu, Zhiqing Zhong, Xinran Qin, Jiayi Yao, Yuancheng Wang, Pinjia He. 467-479 [doi]
- LiRTest: augmenting LiDAR point clouds for automated testing of autonomous driving systemsAn Guo, Yang Feng, Zhenyu Chen 0001. 480-492 [doi]
- Detecting multi-sensor fusion errors in advanced driver-assistance systemsZiyuan Zhong, Zhisheng Hu, Shengjian Guo, Xinyang Zhang, Zhenyu Zhong, Baishakhi Ray. 493-505 [doi]
- Precise and efficient atomicity violation detection for interrupt-driven programs via staged path pruningChao Li, Rui Chen, Boxiang Wang, Tingting Yu, Dongdong Gao, Mengfei Yang. 506-518 [doi]
- Path-sensitive code embedding via contrastive learning for software vulnerability detectionXiao Cheng, Guanqin Zhang, Haoyu Wang 0001, Yulei Sui. 519-531 [doi]
- A large-scale study of usability criteria addressed by static analysis toolsMarcus Nachtigall, Michael Schlichtig, Eric Bodden. 532-543 [doi]
- An empirical study on the effectiveness of static C code analyzers for vulnerability detectionStephan Lipp, Sebastian Banescu, Alexander Pretschner. 544-555 [doi]
- Testing Dafny (experience paper)Ahmed Irfan, Sorawee Porncharoenwase, Zvonimir Rakamaric, Neha Rungta, Emina Torlak. 556-567 [doi]
- Combining static analysis error traces with dynamic symbolic execution (experience paper)Frank Busse, Pritam Gharat, Cristian Cadar, Alastair F. Donaldson. 568-579 [doi]
- The raise of machine learning hyperparameter constraints in Python codeIngkarat Rak-amnouykit, Ana L. Milanova, Guillaume Baudart, Martin Hirzel, Julian Dolby. 580-592 [doi]
- PermDroid: automatically testing permission-related behaviour of Android applicationsShuaihao Yang, Zigang Zeng, Wei Song. 593-604 [doi]
- Detecting and fixing data loss issues in Android appsWunan Guo, Zhen Dong, Liwei Shen, Wei Tian, Ting Su 0001, Xin Peng 0001. 605-616 [doi]
- Automatically detecting API-induced compatibility issues in Android apps: a comparative analysis (replicability study)Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John C. Grundy, Li Li 0029. 617-628 [doi]
- NCScope: hardware-assisted analyzer for native code in Android appsHao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai. 629-641 [doi]
- Detecting resource utilization bugs induced by variant lifecycles in AndroidYifei Lu, Minxue Pan, Yu Pei 0001, Xuandong Li. 642-653 [doi]
- Patch correctness assessment in automated program repair based on the impact of patches on production and test codeAli Ghanbari 0001, Andrian Marcus. 654-665 [doi]
- ATR: template-based repair for Alloy specificationsGuolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Nazareno Aguirre, Marcelo F. Frias, Hamid Bagheri. 666-677 [doi]
- CIRCLE: continual repair across programming languagesWei Yuan, Quanjun Zhang, Tieke He, Chunrong Fang, Nguyen Quoc Viet Hung, Xiaodong Hao, Hongzhi Yin. 678-690 [doi]
- Program vulnerability repair via inductive inferenceYuntong Zhang 0002, Xiang Gao 0012, Gregory J. Duck, Abhik Roychoudhury. 691-702 [doi]
- WASAI: uncovering vulnerabilities in Wasm smart contractsWeimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu. 703-715 [doi]
- Finding permission bugs in smart contracts with role miningYe Liu, Yi Li, Shang-Wei Lin 0001, Cyrille Artho. 716-727 [doi]
- eTainter: detecting gas-related vulnerabilities in smart contractsAsem Ghaleb, Julia Rubin, Karthik Pattabiraman. 728-739 [doi]
- Park: accelerating smart contract vulnerability detection via parallel-fork symbolic executionPeilin Zheng, Zibin Zheng, Xiapu Luo. 740-751 [doi]
- SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerabilityZeqin Liao, Zibin Zheng, Xiao Chen, Yuhong Nan. 752-764 [doi]
- ATUA: an update-driven app testing toolChanh Duc Ngo, Fabrizio Pastore, Lionel C. Briand. 765-768 [doi]
- Automatic generation of smoke test suites for kubernetesCecilio Cannavacciuolo, Leonardo Mariani. 769-772 [doi]
- ESBMC-CHERI: towards verification of C programs for CHERI platforms with ESBMCFranz Brauße, Fedor Shmarov, Rafael Menezes, Mikhail R. Gadelha, Konstantin Korovin, Giles Reger, Lucas C. Cordeiro. 773-776 [doi]
- ESBMC-Jimple: verifying Kotlin programs via jimple intermediate representationRafael Menezes, Daniel Moura, Helena Cavalcante, Rosiane de Freitas, Lucas C. Cordeiro. 777-780 [doi]
- Faster mutation analysis with MeMuAli Ghanbari 0001, Andrian Marcus. 781-784 [doi]
- iFixDataloss: a tool for detecting and fixing data loss issues in Android appsWunan Guo, Zhen Dong, Liwei Shen, Wei Tian, Ting Su 0001, Xin Peng 0001. 785-788 [doi]
- Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilitiesEduard Pinconschi, Quang-Cuong Bui, Rui Abreu 0001, Pedro Adão, Riccardo Scandariato. 789-792 [doi]
- Pytest-Smell: a smell detection tool for Python unit testsAlexandru Bodea. 793-796 [doi]
- QMutPy: a mutation testing tool for Quantum algorithms and applications in QiskitDaniel Fortunato, José Campos, Rui Abreu 0001. 797-800 [doi]
- SpecChecker-ISA: a data sharing analyzer for interrupt-driven embedded softwareBoxiang Wang, Rui Chen, Chao Li, Tingting Yu, Dongdong Gao, Mengfei Yang. 801-804 [doi]
- UniRLTest: universal platform-independent testing with reinforcement learning via image understandingZiqian Zhang, Yulei Liu, Shengcheng Yu, Xin Li, Yexiao Yun, Chunrong Fang, Zhenyu Chen. 805-808 [doi]