Powered by
26th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2017),
July 10–14, 2017,
Santa Barbara, CA, USA
Frontmatter
Technical Papers
Improving Testing
One Test to Rule Them All
Alex Groce, Josie Holmes, and Kevin Kellar
(Northern Arizona University, USA; Pennsylvania State University, USA; Crescent Valley High School, USA)
Test reduction has long been seen as critical for automated testing. However, traditional test reduction simply reduces the length of a test, but does not attempt to reduce semantic complexity. This paper extends previous efforts with algorithms for normalizing and generalizing tests. Rewriting tests into a normal form can reduce semantic complexity and even remove steps from an already delta-debugged test. Moreover, normalization dramatically reduces the number of tests that a reader must examine, partially addressing the ``fuzzer taming'' problem of discovering distinct faults in a set of failing tests. Generalization, in contrast, takes a test and reports what aspects of the test could have been changed while preserving the property that the test fails. Normalization plus generalization aids understanding of tests, including tests for complex and widely used APIs such as the NumPy numeric computation library and the ArcPy GIS scripting package. Normalization frequently reduces the number of tests to be examined by well over an order of magnitude, and often to just one test per fault. Together, ideally, normalization and generalization allow a user to replace reading a large set of tests that vary in unimportant ways with reading one annotated summary test.
@InProceedings{ISSTA17p1,
author = {Alex Groce and Josie Holmes and Kevin Kellar},
title = {One Test to Rule Them All},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {1--11},
doi = {},
year = {2017},
}
Reinforcement Learning for Automatic Test Case Prioritization and Selection in Continuous Integration
Helge Spieker,
Arnaud Gotlieb, Dusica Marijan, and Morten Mossige
(Simula Research Laboratory, Norway; University of Stavanger, Norway; ABB Robotics, Norway)
Testing in Continuous Integration (CI) involves test case prioritization, selection, and execution at each cycle. Selecting the most promising test cases to detect bugs is hard if there are uncertainties on the impact of committed code changes or, if traceability links between code and tests are not available. This paper introduces Retecs, a new method for automatically learning test case selection and prioritization in CI with the goal to minimize the round-trip time between code commits and developer feedback on failed test cases. The Retecs method uses reinforcement learning to select and prioritize test cases according to their duration, previous last execution and failure history. In a constantly changing environment, where new test cases are created and obsolete test cases are deleted, the Retecs method learns to prioritize error-prone test cases higher under guidance of a reward function and by observing previous CI cycles. By applying Retecs on data extracted from three industrial case studies, we show for the first time that reinforcement learning enables fruitful automatic adaptive test case selection and prioritization in CI and regression testing.
@InProceedings{ISSTA17p12,
author = {Helge Spieker and Arnaud Gotlieb and Dusica Marijan and Morten Mossige},
title = {Reinforcement Learning for Automatic Test Case Prioritization and Selection in Continuous Integration},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {12--22},
doi = {},
year = {2017},
}
PerfRanker: Prioritization of Performance Regression Tests for Collection-Intensive Software
Shaikh Mostafa,
Xiaoyin Wang, and Tao Xie
(University of Texas at San Antonio, USA; University of Illinois at Urbana-Champaign, USA)
Regression performance testing is an important but time/resource-consuming phase during software development. Developers need to detect performance regressions as early as possible to reduce their negative impact and fixing cost. However, conducting regression performance testing frequently (e.g., after each commit) is prohibitively expensive. To address this issue, in this paper, we propose PerfRanker, the first approach to prioritizing test cases in performance regression testing for collection-intensive software, a common type of modern software heavily using collections. Our test prioritization is based on performance impact analysis that estimates the performance impact of a given code revision on a given test execution. Evaluation shows that our approach can cover top 3 test cases whose performance is most affected within top 30% to 37% prioritized test cases, in contrast to top 65% to 79% by 3 baseline techniques.
@InProceedings{ISSTA17p23,
author = {Shaikh Mostafa and Xiaoyin Wang and Tao Xie},
title = {PerfRanker: Prioritization of Performance Regression Tests for Collection-Intensive Software},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {23--34},
doi = {},
year = {2017},
}
Artifacts Functional
Compiler-Assisted Test Acceleration on GPUs for Embedded Software
Vanya Yaneva, Ajitha Rajan, and Christophe Dubach
(University of Edinburgh, UK)
Embedded software is found everywhere from our highly visible mobile devices to the confines of our car in the form of smart sensors. Embedded software companies are under huge pressure to produce safe applications that limit risks, and testing is absolutely critical to alleviate concerns regarding safety and user privacy. This requires using large test suites throughout the development process, increasing time-to-market and ultimately hindering competitivity.
Speeding up test execution is, therefore, of paramount importance for embedded software developers. This is traditionally achieved by running, in parallel, multiple tests on large-scale clusters of computers. However, this approach is costly in terms of infrastructure maintenance and energy consumed, and is at times inconvenient as developers have to wait for their tests to be scheduled on a shared resource.
We propose to look at exploiting GPUs (Graphics Processing Units) for running embedded software testing. GPUs are readily available in most computers and offer tremendous amounts of parallelism, making them an ideal target for embedded software testing. In this paper, we demonstrate, for the first time, how test executions of embedded C programs can be automatically performed on a GPU, without involving the end user. We take a compiler-assisted approach which automatically compiles the C program into GPU kernels for parallel execution of the input tests. Using this technique, we achieve an average speedup of 16× when compared to CPU execution of input tests across nine programs from an industry standard embedded benchmark suite.
@InProceedings{ISSTA17p35,
author = {Vanya Yaneva and Ajitha Rajan and Christophe Dubach},
title = {Compiler-Assisted Test Acceleration on GPUs for Embedded Software},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {35--45},
doi = {},
year = {2017},
}
Testing
Targeted Property-Based Testing
Andreas Löscher and Konstantinos Sagonas
(Uppsala University, Sweden)
We introduce targeted property-based testing, an enhanced form of
property-based testing that aims to make the input generation component of a
property-based testing tool guided by a search strategy rather than being
completely random. Thus, this testing technique combines the advantages
of both search-based and property-based testing.
We demonstrate the technique with the framework we have built, called Target,
and show its effectiveness on three case studies. The first of them demonstrates
how Target can employ simulated annealing to generate sensor network topologies
that form configurations with high energy consumption. The second case study
shows how the generation of routing trees for a wireless network equipped with
directional antennas can be guided to fulfill different energy metrics.
The third case study employs Target to test the noninterference property of
information-flow control abstract machine designs, and compares it with a
sophisticated hand-written generator for programs of these abstract machines.
@InProceedings{ISSTA17p46,
author = {Andreas Löscher and Konstantinos Sagonas},
title = {Targeted Property-Based Testing},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {46--56},
doi = {},
year = {2017},
}
Info
Artifacts Functional
Generating Unit Tests with Descriptive Names Or: Would You Name Your Children Thing1 and Thing2?
Ermira Daka,
José Miguel Rojas, and Gordon Fraser
(University of Sheffield, UK)
The name of a unit test helps developers to understand the purpose and scenario of the test, and test names support developers when navigating amongst sets of unit tests. When unit tests are generated automatically, however, they tend to be given non-descriptive names such as “test0”, which provide none of the benefits a descriptive name can give a test. The underlying challenge is that automatically generated tests typically do not represent real scenarios and have no clear purpose other than covering code, which makes naming them di cult. In this paper, we present an automated approach which generates descriptive names for automatically generated unit tests by summarizing API-level coverage goals. The tests are optimized to be short, descriptive of the test, have a clear relation to the covered code under test, and allow developers to uniquely distinguish tests in a test suite. An empirical evaluation with 47 participants shows that developers agree with the synthesized names, and the synthesized names are equally descriptive as manually written names. Study participants were even more accurate and faster at matching code and tests with synthesized names compared to manually derived names.
@InProceedings{ISSTA17p57,
author = {Ermira Daka and José Miguel Rojas and Gordon Fraser},
title = {Generating Unit Tests with Descriptive Names Or: Would You Name Your Children Thing1 and Thing2?},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {57--67},
doi = {},
year = {2017},
}
Info
Artifacts Functional
Symbolic Execution
Accelerating Array Constraints in Symbolic Execution
David M. Perry, Andrea Mattavelli,
Xiangyu Zhang, and
Cristian Cadar
(Purdue University, USA; Imperial College London, UK)
Despite significant recent advances, the effectiveness of symbolic execution is limited when used to test complex, real-world software. One of the main scalability challenges is related to constraint solving: large applications and long exploration paths lead to complex constraints, often involving big arrays indexed by symbolic expressions. In this paper, we propose a set of semantics-preserving transformations for array operations that take advantage of contextual information collected during symbolic execution. Our transformations lead to simpler encodings and hence better performance in constraint solving. The results we obtain are encouraging: we show, through an extensive experimental analysis, that our transformations help to significantly improve the performance of symbolic execution in the presence of arrays. We also show that our transformations enable the analysis of new code, which would be otherwise out of reach for symbolic execution.
@InProceedings{ISSTA17p68,
author = {David M. Perry and Andrea Mattavelli and Xiangyu Zhang and Cristian Cadar},
title = {Accelerating Array Constraints in Symbolic Execution},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {68--78},
doi = {},
year = {2017},
}
Info
Artifacts Functional
Improving the Cost-Effectiveness of Symbolic Testing Techniques for Transport Protocol Implementations under Packet Dynamics
Wei Sun, Lisong Xu, and Sebastian Elbaum
(University of Nebraska-Lincoln, USA)
The majority of Internet traffic is transferred by transport protocols. The correctness of these transport protocol implementations is hard to validate as their behaviors depend not only on their protocols but also on their network environments that can introduce dynamic packet delay and loss. Random testing, widely used in industry due to its simplicity and low cost, struggles to detect packet delay related faults which occur with low probability. Symbolic execution based testing is promising at detecting such low probability faults, but it requires large testing budgets as it attempts to cover a prohibitively large input space of packet dynamics. To improve its cost-effectiveness, we propose two domain-specific heuristic techniques, called packet retransmission based priority and network state based priority, which are motivated by two common transport protocol properties. In our experiments using the Linux TFTP programs, our techniques improve the cost-effectiveness of symbolic execution based testing for transport protocols, detecting three times as many faults when the budget is in the range of minutes and hours.
@InProceedings{ISSTA17p79,
author = {Wei Sun and Lisong Xu and Sebastian Elbaum},
title = {Improving the Cost-Effectiveness of Symbolic Testing Techniques for Transport Protocol Implementations under Packet Dynamics},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {79--89},
doi = {},
year = {2017},
}
Artifacts Functional
Combining Symbolic Execution and Search-Based Testing for Programs with Complex Heap Inputs
Pietro Braione, Giovanni Denaro, Andrea Mattavelli, and Mauro Pezzè
(University of Milano-Bicocca, Italy; Imperial College London, UK; University of Lugano, Switerland)
Despite the recent improvements in automatic test case generation,
handling complex data structures as test inputs is still an open
problem. Search-based approaches can generate sequences of method
calls that instantiate structured inputs to exercise a relevant
portion of the code, but fall short in building inputs to execute
program elements whose reachability is determined by the structural
features of the input structures themselves. Symbolic execution
techniques can effectively handle structured inputs, but do not
identify the sequences of method calls that instantiate the input
structures through legal interfaces. In this paper, we propose a new
approach to automatically generate test cases for programs with
complex data structures as inputs. We use symbolic execution to
generate path conditions that characterise the dependencies between
the program paths and the input structures, and convert the path
conditions to optimisation problems that we solve with search-based
techniques to produce sequences of method calls that instantiate
those inputs. Our preliminary results show that the approach is
indeed effective in generating test cases for programs with complex
data structures as inputs, thus opening a promising research
direction.
@InProceedings{ISSTA17p90,
author = {Pietro Braione and Giovanni Denaro and Andrea Mattavelli and Mauro Pezzè},
title = {Combining Symbolic Execution and Search-Based Testing for Programs with Complex Heap Inputs},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {90--101},
doi = {},
year = {2017},
}
Artifacts Functional
Concurrency
Efficient Computation of Happens-Before Relation for Event-Driven Programs
Pallavi Maiya and Aditya Kanade
(IISc Bangalore, India)
An emerging style of programming is to use both threads and events to achieve better scalability. The improved scalability comes at the price of increased complexity, as both threads and events can follow non-deterministic schedules. The happens-before (HB) relation captures the space of possible schedules and forms the basis of various concurrency analyses. Improving efficiency of the HB computation can speed up these analyses.
In this paper, we identify a major bottleneck in computation of the HB relation for such event-driven programs. Event-driven programs are designed to interact continuously with their environment, and usually receive a large number of events even within a short span of time. This increases the cost of discovering the HB order among the events. We propose a novel data structure, called event graph, that maintains a subset of the HB relation to efficiently infer order between any pair of events. We present an algorithm, called EventTrack, which improves efficiency of vector clock based HB computation for event-driven programs using event graphs.
We have implemented EventTrack and evaluated it on traces of eight Android applications. Compared to the state-of-the-art technique, EventTrack gave an average speedup of 4.9X. The speedup ranged from 1.8X to 10.3X across the applications.
@InProceedings{ISSTA17p102,
author = {Pallavi Maiya and Aditya Kanade},
title = {Efficient Computation of Happens-Before Relation for Event-Driven Programs},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {102--112},
doi = {},
year = {2017},
}
Info
Artifacts Functional
Automatic Detection and Validation of Race Conditions in Interrupt-Driven Embedded Software
Yu Wang,
Linzhang Wang, Tingting Yu, Jianhua Zhao, and
Xuandong Li
(Nanjing University, China; University of Kentucky, USA)
Interrupt-driven programs are widely deployed in safety-critical embedded systems
to perform hardware and resource dependent data operation tasks.
The frequent use of interrupts in these systems can cause race conditions to
occur due to interactions between application tasks and interrupt handlers.
Numerous program analysis and testing techniques have been proposed to
detect races in multithreaded programs. Little work, however, has addressed race
condition problems related to hardware interrupts.
In this paper, we present SDRacer, an automated framework that can detect and
validate race conditions in interrupt-driven embedded software.
It uses a combination of static analysis and symbolic execution
to generate input data for exercising the
potential races. It then employs virtual platforms
to dynamically validate these races by forcing the interrupts to occur
at the potential racing points.
We evaluate SDRacer on nine real-world embedded programs written in C language.
The results show that SDRacer can precisely detect race conditions.
@InProceedings{ISSTA17p113,
author = {Yu Wang and Linzhang Wang and Tingting Yu and Jianhua Zhao and Xuandong Li},
title = {Automatic Detection and Validation of Race Conditions in Interrupt-Driven Embedded Software},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {113--124},
doi = {},
year = {2017},
}
Monitoring Decentralized Specifications
Antoine El-Hokayem and Yliès Falcone
(Grenoble Alpes University, France; Inria, France; CNRS, France; Laboratoire d'Informatique de Grenoble, France)
We define two complementary approaches to monitor decentralized systems. The first relies on those with a centralized specification, i.e, when the specification is written for the behavior of the entire system. To do so, our approach introduces a data-structure that i) keeps track of the execution of an automaton, ii) has predictable parameters and size, and iii) guarantees strong eventual consistency. The second approach defines decentralized specifications wherein multiple specifications are provided for separate parts of the system. We study decentralized monitorability, and present a general algorithm for monitoring decentralized specifications. We map three existing algorithms to our approaches and provide a framework for analyzing their behavior. Lastly, we introduce our tool, which is a framework for designing such decentralized algorithms, and simulating their behavior.
@InProceedings{ISSTA17p125,
author = {Antoine El-Hokayem and Yliès Falcone},
title = {Monitoring Decentralized Specifications},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {125--135},
doi = {},
year = {2017},
}
Info
Artifacts Functional
Dynamic Analysis
Effective Online Software Anomaly Detection
Yizhen Chen, Ming Ying, Daren Liu, Adil Alim, Feng Chen, and Mei-Hwa Chen
(SUNY Albany, USA)
While automatic online software anomaly detection is crucial for ensuring the quality of production software, current techniques are mostly inefficient and ineffective. For online software, its inputs are usually provided by the users at runtime and the validity of the outputs cannot be automatically verified without a predefined oracle. Furthermore, some online anomalous behavior may be caused by the anomalies in the execution context, rather than by any code defect, which are even more difficult to detect. Existing approaches tackle this problem by identifying certain properties observed from the executions of the software during a training process and using them to monitor online software behavior. However, they may require a large execution overhead for monitoring the properties, which limits the applicability of these approaches for online monitoring. We present a methodology that applies effective algorithms to select a close to optimal set of anomaly-revealing properties, which enables online anomaly detection with minimal execution overhead. Our empirical results show that an average of 76.5% of anomalies were detected by using at most 5.5% of execution overhead.
@InProceedings{ISSTA17p136,
author = {Yizhen Chen and Ming Ying and Daren Liu and Adil Alim and Feng Chen and Mei-Hwa Chen},
title = {Effective Online Software Anomaly Detection},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {136--146},
doi = {},
year = {2017},
}
Semi-automated Discovery of Server-Based Information Oversharing Vulnerabilities in Android Applications
William Koch, Abdelberi Chaabane, Manuel Egele, William Robertson, and Engin Kirda
(Boston University, USA; Northeastern University, USA)
Modern applications are often split into separate client and server tiers that communicate via message passing over the network. One well-understood threat to privacy for such applications is the leakage of sensitive user information either in transit or at the server. In response, an array of defensive techniques have been developed to identify or block unintended or malicious information leakage. However, prior work has primarily considered privacy leaks originating at the client directed at the server, while leakage in the reverse direction -- from the server to the client -- is comparatively under-studied. The question of whether and to what degree this leakage constitutes a threat remains an open question. We answer this question in the affirmative with Hush, a technique for semi-automatically identifying Server-based InFormation OvershariNg (SIFON) vulnerabilities in multi-tier applications. In particular, the technique detects SIFON vulnerabilities using a heuristic that overshared sensitive information from server-side APIs will not be displayed by the application's user interface. The technique first performs a scalable static program analysis to screen applications for potential vulnerabilities, and then attempts to confirm these candidates as true vulnerabilities with a partially-automated dynamic analysis. Our evaluation over a large corpus of Android applications demonstrates the effectiveness of the technique by discovering several previously-unknown SIFON vulnerabilities in eight applications.
@InProceedings{ISSTA17p147,
author = {William Koch and Abdelberi Chaabane and Manuel Egele and William Robertson and Engin Kirda},
title = {Semi-automated Discovery of Server-Based Information Oversharing Vulnerabilities in Android Applications},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {147--157},
doi = {},
year = {2017},
}
CPR: Cross Platform Binary Code Reuse via Platform Independent Trace Program
Yonghwi Kwon, Weihang Wang, Yunhui Zheng,
Xiangyu Zhang, and Dongyan Xu
(Purdue University, USA; IBM Research, USA)
The rapid growth of Internet of Things (IoT) has been created a number of new
platforms recently.
Unfortunately, such variety of IoT devices
causes platform fragmentation which makes software development on
such devices challenging.
In particular, existing programs cannot be simply reused on such devices as they
rely on certain underlying hardware and software interfaces which we call platform dependencies.
In this paper, we present CPR, a novel technique that synthesizes a platform
independent program from a platform dependent program.
Specifically, we leverage
an existing system called PIEtrace which can generate a platform independent
trace program. The generated trace program is platform independent while
it can only reproduce a specific execution path.
Hence, we develop an algorithm to merge a set of platform independent trace
programs and synthesize a general program that can take multiple inputs.
The synthesized platform-independent program is representative of the
merged trace programs and the results produced by the program is correct
if no exceptions occur.
Our evaluation results on 15 real-world
applications show that CPR is highly effective on reusing existing binaries
across platforms.
@InProceedings{ISSTA17p158,
author = {Yonghwi Kwon and Weihang Wang and Yunhui Zheng and Xiangyu Zhang and Dongyan Xu},
title = {CPR: Cross Platform Binary Code Reuse via Platform Independent Trace Program},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {158--169},
doi = {},
year = {2017},
}
An Actionable Performance Profiler for Optimizing the Order of Evaluations
Marija Selakovic, Thomas Glaser, and
Michael Pradel
(TU Darmstadt, Germany)
The efficiency of programs often can be improved by applying rel-
atively simple changes. To find such optimization opportunities,
developers either rely on manual performance tuning, which is
time-consuming and requires expert knowledge, or on traditional
profilers, which show where resources are spent but not how to
optimize the program. This paper presents a profiler that provides
actionable advice, by not only finding optimization opportunities
but by also suggesting code transformations that exploit them.
Specifically, we focus on optimization opportunities related to the
order of evaluating subexpressions that are part of a decision made
by the program. To help developers find such reordering opportuni-
ties, we present DecisionProf, a dynamic analysis that automatically
identifies the optimal order, for a given input, of checks in logical
expressions and in switch statements. The key idea is to assess
the computational costs of all possible orders, to find the optimal
order, and to suggest a code transformation to the developer only
if reordering yields a statistically significant performance improve-
ment. Applying DecisionProf to 43 real-world JavaScript projects
reveals 52 beneficial reordering opportunities. Optimizing the code
as proposed by DecisionProf reduces the execution time of indi-
vidual functions between 2.5% and 59%, and leads to statistically
significant application-level performance improvements that range
between 2.5% and 6.5%.
@InProceedings{ISSTA17p170,
author = {Marija Selakovic and Thomas Glaser and Michael Pradel},
title = {An Actionable Performance Profiler for Optimizing the Order of Evaluations},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {170--180},
doi = {},
year = {2017},
}
The Web
Testing and Analysis of Web Applications using Page Models
Snigdha Athaiya and Raghavan Komondoor
(IISc Bangalore, India)
Web applications are difficult to analyze using code-based tools
because data-flow and control-flow through the application occurs via both
server-side code and client-side pages. Client-side pages are typically
specified in a scripting language that is different from the main
server-side language; moreover, the
pages are generated dynamically from the scripts. To address these issues
we propose a static-analysis approach that automatically constructs a
``model'' of each page in a given application. A page model is a code
fragment in the same language as the server-side code, which faithfully
over-approximates the possible elements of the page as well as the
control-flows and data-flows due to these elements. The server-side code
in conjunction with the page models then becomes a standard (non-web)
program, thus amenable to analysis using standard code-based tools.
We have implemented our approach in the context of J2EE applications. We
demonstrate the versatility and usefulness of our approach by applying three
standard analysis tools on the resultant programs from our approach: a
concolic-execution based model checker (JPF), a dynamic fault localization
tool (Zoltar), and a static slicer (Wala).
@InProceedings{ISSTA17p181,
author = {Snigdha Athaiya and Raghavan Komondoor},
title = {Testing and Analysis of Web Applications using Page Models},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {181--191},
doi = {},
year = {2017},
}
Artifacts Functional
Automated Layout Failure Detection for Responsive Web Pages without an Explicit Oracle
Thomas A. Walsh, Gregory M. Kapfhammer, and Phil McMinn
(University of Sheffield, UK; Allegheny College, USA)
As the number and variety of devices being used to access the World Wide Web grows exponentially, ensuring the correct presentation of a web page, regardless of the device used to browse it, is an important and challenging task. When developers adopt responsive web design (RWD) techniques, web pages modify their appearance to accommodate a device’s display constraints. However, a current lack of automated support means that presentation failures may go undetected in a page’s layout when rendered for different viewport sizes. A central problem is the difficulty in providing an automated “oracle” to validate RWD layouts against, meaning that checking for failures is largely a manual process in practice, which results in layout failures in many live responsive web sites. This paper presents an automated failure detection technique that checks the consistency of a responsive page’s layout across a range of viewport widths, obviating the need for an explicit oracle. In an empirical study, this method found failures in 16 of 26 real-world production pages studied, detecting 33 distinct failures in total.
@InProceedings{ISSTA17p192,
author = {Thomas A. Walsh and Gregory M. Kapfhammer and Phil McMinn},
title = {Automated Layout Failure Detection for Responsive Web Pages without an Explicit Oracle},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {192--202},
doi = {},
year = {2017},
}
Test Execution Checkpointing for Web Applications
Marco Guarnieri, Petar Tsankov, Tristan Buchs, Mohammad Torabi Dashti, and
David Basin
(ETH Zurich, Switzerland; EPFL, Switzerland)
Test isolation is a prerequisite for the correct execution of test suites on web applications. We present Test Execution Checkpointing, a method for efficient test isolation. Our method instruments web applications to support checkpointing and exploits this support to isolate and optimize tests. We have implemented and evaluated this method on five popular PHP web applications. The results show that our method not only provides test isolation essentially for free, it also reduces testing time by 44% on average.
@InProceedings{ISSTA17p203,
author = {Marco Guarnieri and Petar Tsankov and Tristan Buchs and Mohammad Torabi Dashti and David Basin},
title = {Test Execution Checkpointing for Web Applications},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {203--214},
doi = {},
year = {2017},
}
Experience Report
Experience Paper: A Study on Behavioral Backward Incompatibilities of Java Software Libraries
Shaikh Mostafa, Rodney Rodriguez, and Xiaoyin Wang
(University of Texas at San Antonio, USA)
Nowadays, due to the frequent technological innovation and market changes, software libraries are evolving very quickly. Backward compatibility has always been one of the most important requirements during the evolution of software platforms and libraries. However, backward compatibility is seldom fully achieved in practice, and many relevant software failures are reported. Therefore, it is important to understand the status, major reasons, and impact of backward incompatibilities in real world software. This paper presents an empirical study to understand behavioral changes of APIs during evolution of software libraries. Specifically, we performed a large-scale cross-version regression testing on 68 consecutive version pairs from 15 popular Java software libraries. Furthermore, we collected and studied 126 real-world software bugs reports on backward incompatibilities of software libraries. Our major findings include: (1) 1,094 test failures / errors and 296 behavioral backward incompatibilities are detected from 52 of 68 consecutive version pairs; (2) there is a distribution mismatch between incompatibilities detected by library-side regression testing, and bug-inducing incompatibilities; (3) the majority of behavioral backward incompatibilities are not well documented in API documents or release notes; and (4) 67% of fixed client bugs caused by backward incompatibilities in software libraries are fixed by client developers, through several simple change patterns made to the backward incompatible API invocation.
@InProceedings{ISSTA17p215,
author = {Shaikh Mostafa and Rodney Rodriguez and Xiaoyin Wang},
title = {Experience Paper: A Study on Behavioral Backward Incompatibilities of Java Software Libraries},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {215--225},
doi = {},
year = {2017},
}
Program Repair and Patching
Identifying Test-Suite-Overfitted Patches through Test Case Generation
Qi Xin and
Steven P. Reiss
(Brown University, USA)
A typical automatic program repair technique that uses a test suite as the correct criterion can produce a patched program that is test-suite-overfitted, or overfitting, which passes the test suite but does not actually repair the bug. In this paper, we propose DiffTGen which identifies a patched program to be overfitting by first generating new test inputs that uncover semantic differences between the original faulty program and the patched program, then testing the patched program based on the semantic differences, and finally generating test cases. Such a test case could be added to the original test suite to make it stronger and could prevent the repair technique from generating a similar overfitting patch again. We evaluated DiffTGen on 89 patches generated by four automatic repair techniques for Java with 79 of them being likely to be overfitting and incorrect. DiffTGen identifies in total 39 (49.4%) overfitting patches and yields the corresponding test cases. We further show that an automatic repair technique, if configured with DiffTGen, could avoid yielding overfitting patches and potentially produce correct ones.
@InProceedings{ISSTA17p226,
author = {Qi Xin and Steven P. Reiss},
title = {Identifying Test-Suite-Overfitted Patches through Test Case Generation},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {226--236},
doi = {},
year = {2017},
}
Impact of Tool Support in Patch Construction
Anil Koyuncu,
Tegawendé F. Bissyandé,
Dongsun Kim,
Jacques Klein, Martin Monperrus, and Yves Le Traon
(University of Luxembourg, Luxembourg; Inria, France; University of Lille, France)
In this work, we investigate the practice of patch construction in the Linux kernel development,
focusing on the differences between three patching processes: (1) patches crafted entirely manually to fix bugs,
(2) those that are derived from warnings of bug detection tools, and (3) those that
are automatically generated based on fix patterns. With this study, we
provide to the research community concrete insights on the practice
of patching as well as how the development community is currently embracing research and commercial patching tools to improve productivity in repair.
The result of our study shows that tool-supported patches are increasingly adopted by the developer community while manually-written patches are accepted more quickly.
Patch application tools enable developers to remain committed to contributing patches to the code base.
Our findings also include that, in actual development processes, patches generally implement several change operations spread over the code, even for patches fixing warnings by bug detection tools. Finally, this study has shown that there is an opportunity to directly leverage the output of bug detection tools to readily generate patches that are appropriate for fixing the problem, and that are consistent with manually-written patches.
@InProceedings{ISSTA17p237,
author = {Anil Koyuncu and Tegawendé F. Bissyandé and Dongsun Kim and Jacques Klein and Martin Monperrus and Yves Le Traon},
title = {Impact of Tool Support in Patch Construction},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {237--248},
doi = {},
year = {2017},
}
Automated Repair of Layout Cross Browser Issues using Search-Based Techniques
Sonal Mahajan, Abdulmajeed Alameer, Phil McMinn, and
William G. J. Halfond
(University of Southern California, USA; University of Sheffield, UK)
A consistent cross-browser user experience is crucial for the success of a website. Layout Cross Browser Issues (XBIs) can severely undermine a website’s success by causing web pages to render incorrectly in certain browsers, thereby negatively impacting users’ impression of the quality and services that the web page delivers. Existing Cross Browser Testing (XBT) techniques can only detect XBIs in websites. Repairing them is, hitherto, a manual task that is labor intensive and requires significant expertise. Addressing this concern, our paper proposes a technique for automatically repairing layout XBIs in websites using guided search-based techniques. Our empirical evaluation showed that our approach was able to successfully fix 86% of layout XBIs reported for 15 different web pages studied, thereby improving their cross-browser consistency.
@InProceedings{ISSTA17p249,
author = {Sonal Mahajan and Abdulmajeed Alameer and Phil McMinn and William G. J. Halfond},
title = {Automated Repair of Layout Cross Browser Issues using Search-Based Techniques},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {249--260},
doi = {},
year = {2017},
}
Artifacts Functional
Fault Localization and Mutation Testing
Boosting Spectrum-Based Fault Localization using PageRank
Mengshi Zhang, Xia Li, Lingming Zhang, and Sarfraz Khurshid
(University of Texas at Austin, USA; University of Texas at Dallas, USA)
Manual debugging is notoriously tedious and time consuming. Therefore, various automated fault localization techniques have been proposed to help with manual debugging. Among the existing fault localization techniques, spectrum-based fault localization (SBFL) is one of the most widely studied techniques due to being lightweight. A focus of existing SBFL techniques is to consider how to differentiate program source code entities (i.e., one dimension in program spectra); indeed, this focus is aligned with the ultimate goal of finding the faulty lines of code. Our key insight is to enhance existing SBFL techniques by additionally considering how to differentiate tests (i.e., the other dimension in program spectra), which, to the best of our knowledge, has not been studied in prior work.
We present PRFL, a lightweight technique that boosts spectrum-based fault localization by differentiating tests using PageRank algorithm. Given the original program spectrum information, PRFL uses PageRank to recompute the spectrum information by considering the contributions of different tests. Then, traditional SBFL techniques can be applied on the recomputed spectrum information to achieve more effective fault localization. Although simple and lightweight, PRFL has been demonstrated to outperform state-of-the-art SBFL techniques significantly (e.g., ranking 42% more real faults within Top-1 compared with the most effective traditional SBFL technique) with low overhead (e.g., around 2 minute average extra overhead on real faults) on 357 real faults from 5 Defects4J projects and 30692 artificial (i.e., mutation) faults from 87 GitHub projects, demonstrating a promising future for considering the contributions of different tests during fault localization.
@InProceedings{ISSTA17p261,
author = {Mengshi Zhang and Xia Li and Lingming Zhang and Sarfraz Khurshid},
title = {Boosting Spectrum-Based Fault Localization using PageRank},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {261--272},
doi = {},
year = {2017},
}
FLUCCS: Using Code and Change Metrics to Improve Fault Localization
Jeongju Sohn and
Shin Yoo
(KAIST, South Korea)
Fault localization aims to support the debugging activities of human developers
by highlighting the program elements that are suspected to be responsible for the
observed failure. Spectrum Based Fault Localization (SBFL), an existing localization
technique that only relies on the coverage and pass/fail results of executed test
cases, has been widely studied but also criticized for the lack of precision and
limited effort reduction. To overcome restrictions of techniques based purely on
coverage, we extend SBFL with code and change metrics that have been studied in the
context of defect prediction, such as size, age and code churn. Using suspiciousness
values from existing SBFL formulas and these source code metrics as features,
we apply two learn-to-rank techniques, Genetic Programming (GP) and linear
rank Support Vector Machines (SVMs). We evaluate our approach with a ten-fold
cross validation of method level fault localization, using 210 real world faults from
the Defects4J repository. GP with additional source code metrics ranks the
faulty method at the top for 106 faults, and within the top five for 173 faults.
This is a significant improvement over the state-of-the-art SBFL formulas,
the best of which can rank 49 and 127 faults at the top and within the top five,
respectively.
@InProceedings{ISSTA17p273,
author = {Jeongju Sohn and Shin Yoo},
title = {FLUCCS: Using Code and Change Metrics to Improve Fault Localization},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {273--283},
doi = {},
year = {2017},
}
Inferring Mutant Utility from Program Context
René Just, Bob Kurtz, and
Paul Ammann
(University of Massachusetts, USA; George Mason University, USA)
Existing mutation techniques produce vast numbers of equivalent, trivial, and redundant mutants. Selective mutation strategies aim to reduce the inherent redundancy of full mutation analysis to obtain most of its benefit for a fraction of the cost. Unfortunately, recent research has shown that there is no fixed selective mutation strategy that is effective across a broad range of programs; the utility (i.e., usefulness) of a mutant produced by a given mutation operator varies greatly across programs.
This paper hypothesizes that mutant utility, in terms of equivalence, triviality, and dominance, can be predicted by incorporating context information from the program in which the mutant is embedded. Specifically, this paper (1) explains the intuition behind this hypothesis with a motivational example, (2) proposes an approach for modeling program context using a program's abstract syntax tree, and (3) proposes and evaluates a series of program-context models for predicting mutant utility. The results for 129 mutation operators show that program context information greatly increases the ability to predict mutant utility. The results further show that it is important to consider program context for individual mutation operators rather than mutation operator groups.
@InProceedings{ISSTA17p284,
author = {René Just and Bob Kurtz and Paul Ammann},
title = {Inferring Mutant Utility from Program Context},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {284--294},
doi = {},
year = {2017},
}
Artifacts Functional
Faster Mutation Analysis via Equivalence Modulo States
Bo Wang, Yingfei Xiong, Yangqingwei Shi,
Lu Zhang, and
Dan Hao
(Peking University, China)
Mutation analysis has many applications, such as asserting the
quality of test suites and localizing faults. One important
bottleneck of mutation analysis is scalability.
The latest work explores the possibility of reducing the redundant
execution via split-stream execution.
However, split-stream execution is only able to remove redundant
execution before the first mutated statement.
In this paper we try to also reduce some of the redundant execution
after the execution of the first mutated statement. We observe that,
although many mutated statements are not equivalent,
the execution result of those mutated statements may
still be equivalent to the result of the original statement. In
other words, the statements are equivalent modulo the current state.
In this paper we propose a fast mutation
analysis approach, AccMut. AccMut automatically detects the
equivalence modulo states among a statement and its mutations, then
groups the statements into equivalence classes modulo states, and
uses only one process to represent each class. In this way, we can
significantly reduce the number of split processes. Our experiments
show that our approach can further accelerate mutation
analysis on top of split-stream execution
with a speedup of 2.56x on average.
@InProceedings{ISSTA17p295,
author = {Bo Wang and Yingfei Xiong and Yangqingwei Shi and Lu Zhang and Dan Hao},
title = {Faster Mutation Analysis via Equivalence Modulo States},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {295--306},
doi = {},
year = {2017},
}
Static Analysis
Just-in-Time Static Analysis
Lisa Nguyen Quang Do, Karim Ali,
Benjamin Livshits,
Eric Bodden, Justin Smith, and Emerson Murphy-Hill
(Fraunhofer IEM, Germany; University of Alberta, Canada; Imperial College London, UK; University of Paderborn, Germany; North Carolina State University, USA)
We present the concept of Just-In-Time (JIT) static analysis that interleaves code development and bug fixing in an integrated development environment. Unlike traditional batch-style analysis tools, a JIT analysis tool presents warnings to code developers over time, providing the most relevant results quickly, and computing less relevant results incrementally later. In this paper, we describe general guidelines for designing JIT analyses. We also present a general recipe for transforming static data-flow analyses to JIT analyses through a concept of layered analysis execution. We illustrate this transformation through CHEETAH, a JIT taint analysis for Android applications. Our empirical evaluation of CHEETAH on real-world applications shows that our approach returns warnings quickly enough to avoid disrupting the normal workflow of developers. This result is confirmed by our user study, in which developers fixed data leaks twice as fast when using CHEETAH compared to an equivalent batch-style analysis.
@InProceedings{ISSTA17p307,
author = {Lisa Nguyen Quang Do and Karim Ali and Benjamin Livshits and Eric Bodden and Justin Smith and Emerson Murphy-Hill},
title = {Just-in-Time Static Analysis},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {307--317},
doi = {},
year = {2017},
}
Video
Info
Artifacts Functional
Refining Interprocedural Change-Impact Analysis using Equivalence Relations
Alex Gyori,
Shuvendu K. Lahiri, and Nimrod Partush
(University of Illinois at Urbana-Champaign, USA; Microsoft Research, USA; Technion, Israel)
Change-impact analysis (CIA) is the task of determining the set of program elements impacted by a program change. Precise CIA has great potential to avoid expensive testing and code reviews
for (parts of) changes that are refactorings (semantics-preserving). However most statement-level CIA techniques suffer from imprecision as they do not incorporate the semantics of the change.
We formalize change impact in terms of the trace semantics of two program versions. We show how to leverage equivalence relations to make dataflow-based CIA aware of the change semantics, thereby improving precision in the presence of semantics-preserving changes. We propose an anytime algorithm that applies costly equivalence-relation inference incrementally to refine the
set of impacted statements. We implemented a prototype and evaluated it on 322 real-world changes from open-source projects and benchmark programs used by prior research. The evaluation results
show an average 35% improvement in the number of impacted statements compared to prior dataflow-based techniques.
@InProceedings{ISSTA17p318,
author = {Alex Gyori and Shuvendu K. Lahiri and Nimrod Partush},
title = {Refining Interprocedural Change-Impact Analysis using Equivalence Relations},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {318--328},
doi = {},
year = {2017},
}
Boosting the Precision of Virtual Call Integrity Protection with Partial Pointer Analysis for C++
Xiaokang Fan, Yulei Sui,
Xiangke Liao, and
Jingling Xue
(UNSW, Australia; National University of Defense Technology, China)
We present, VIP, an approach to boosting the precision of Virtual call
Integrity Protection for large-scale real-world C++ programs (e.g., Chrome)
by using pointer analysis for the first time. VIP introduces two new
techniques: (1) a sound and scalable partial pointer analysis for discovering
statically the sets of legitimate targets at virtual callsites from separately
compiled C++ modules and (2) a lightweight instrumentation technique for
performing (virtual call) integrity checks at runtime. VIP raises the bar
against vtable hijacking attacks by providing stronger security guarantees
than the CHA-based approach with comparable performance overhead.
VIP is implemented in LLVM-3.8.0 and evaluated using SPEC programs and Chrome.
Statically, VIP protects virtual calls more effectively than CHA by
significantly reducing the sets of legitimate targets permitted at 20.3% of the
virtual callsites per program, on average. Dynamically, VIP incurs an average
(maximum) instrumentation overhead of 0.7% (3.3%), making it practically
deployable as part of a compiler tool chain.
@InProceedings{ISSTA17p329,
author = {Xiaokang Fan and Yulei Sui and Xiangke Liao and Jingling Xue},
title = {Boosting the Precision of Virtual Call Integrity Protection with Partial Pointer Analysis for C++},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {329--340},
doi = {},
year = {2017},
}
Artifacts Functional
Lightweight Detection of Physical Unit Inconsistencies without Program Annotations
John-Paul Ore, Carrick Detweiler, and Sebastian Elbaum
(University of Nebraska-Lincoln, USA)
Systems interacting with the physical world operate on quantities measured with physical units. When unit operations in a program are inconsistent with the physical units' rules, those systems may suffer. Existing approaches to support unit consistency in programs can impose an unacceptable burden on developers. In this paper, we present a lightweight static analysis approach focused on physical unit inconsistency detection that requires no end-user program annotation, modification, or migration. It does so by capitalizing on existing shared libraries that handle standardized physical units, common in the cyber-physical domain, to link class attributes of shared libraries to physical units. Then, leveraging rules from dimensional analysis, the approach propagates and infers units in programs that use these shared libraries, and detects inconsistent unit usage. We implement and evaluate the approach in a tool, analyzing 213 open-source systems containing +900,000 LOC, finding inconsistencies in 11% of them, with an 87% true positive rate for a class of inconsistencies detected with high confidence. An initial survey of robot system developers finds that the unit inconsistencies detected by our tool are 'problematic', and we investigate how and when these inconsistencies occur.
@InProceedings{ISSTA17p341,
author = {John-Paul Ore and Carrick Detweiler and Sebastian Elbaum},
title = {Lightweight Detection of Physical Unit Inconsistencies without Program Annotations},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {341--351},
doi = {},
year = {2017},
}
Artifacts Functional
Demonstrations
Phriky-Units: A Lightweight, Annotation-Free Physical Unit Inconsistency Detection Tool
John-Paul Ore, Carrick Detweiler, and Sebastian Elbaum
(University of Nebraska-Lincoln, USA; University on Nebraska-Lincoln, USA)
Systems that interact with the physical world use software that represents and manipulates physical quantities. To operate correctly, these systems must obey the rules of how quantities with physical units can be combined, compared, and manipulated. Incorrectly manipulating physical quantities can cause faults that go undetected by the type system, likely manifesting later as incorrect behavior. Existing approaches for inconsistency detection require code annotation, physical unit libraries, or specialized programming languages. We introduce Phriky-Units, a static
analysis tool that detects physical unit inconsistencies in robotic software without developer annotations. It does so by capitalizing on existing shared libraries that handle standardized physical units, common in the cyber-physical domain, to link class attributes of shared libraries to physical units. In this work, we describe how Phriky-Units works, provide details of the implementation, and explain how Phriky-Units can be used. Finally we present a summary of an empirical evaluation showing it has an 87% true positive rate for a class of inconsistencies we detect with high-confidence.
@InProceedings{ISSTA17p352,
author = {John-Paul Ore and Carrick Detweiler and Sebastian Elbaum},
title = {Phriky-Units: A Lightweight, Annotation-Free Physical Unit Inconsistency Detection Tool},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {352--355},
doi = {},
year = {2017},
}
A Suite of Tools for Making Effective Use of Automatically Generated Tests
Josie Holmes and
Alex Groce
(Pennsylvania State University, USA; Northern Arizona University, USA)
Automated test generation tools (we hope) produce failing tests from time to time. In a world of fault-free code this would not be true, but in such a world we would not need automated test generation tools. Failing tests are generally speaking the most valuable products of the testing process, and users need tools that extract their full value. This paper describes the tools provided by the TSTL testing language for making use of tests (which are not limited to failing tests). In addition to the usual tools for simple delta-debugging and executing tests as regressions, TSTL provides tools for 1) minimizing tests by criteria other than failure, such as code coverage, 2) normalizing tests to achieve further reduction and canonicalization than provided by delta-debugging, 3) generalizing tests to describe the neighborhood of similar tests that fail in the same fashion, and 4) avoiding slippage, where delta-debugging causes a failing test to change underlying fault. These tools can be accessed both by easy-to-use command-line tools and via a powerful API that supports more complex custom test manipulations.
@InProceedings{ISSTA17p356,
author = {Josie Holmes and Alex Groce},
title = {A Suite of Tools for Making Effective Use of Automatically Generated Tests},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {356--359},
doi = {},
year = {2017},
}
ReDeCheck: An Automatic Layout Failure Checking Tool for Responsively Designed Web Pages
Thomas A. Walsh, Gregory M. Kapfhammer, and Phil McMinn
(University of Sheffield, UK; Allegheny College, USA)
Since people frequently access websites with a wide variety of devices (e.g., mobile phones, laptops, and desktops), developers need frameworks and tools for creating layouts that are useful at many viewport widths. While responsive web design (RWD) principles and frameworks facilitate the development of such sites, there is a lack of tools supporting the detection of failures in their layout. Since the quality assurance process for responsively designed websites is often manual, time-consuming, and error-prone, this paper presents ReDeCheck, an automated layout checking tool that alerts developers to both potential unintended regressions in responsive layout and common types of layout failure. In addition to summarizing ReDeCheck’s benefits, this paper explores two different usage scenarios for this tool that is publicly available on GitHub.
@InProceedings{ISSTA17p360,
author = {Thomas A. Walsh and Gregory M. Kapfhammer and Phil McMinn},
title = {ReDeCheck: An Automatic Layout Failure Checking Tool for Responsively Designed Web Pages},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {360--363},
doi = {},
year = {2017},
}
CUT: Automatic Unit Testing in the Cloud
Alessio Gambi, Sebastian Kappler, Johannes Lampel, and Andreas Zeller
(Saarland University, Germany)
Unit tests can be significantly sped up by running them in parallel over distributed execution environments, such as the cloud. However, manually setting up such environments and configuring the testing frameworks to effectively use them is cumbersome and requires specialized expertise that developers might lack.
We present Cloud Unit Testing (CUT), a tool for automatically executing unit tests in distributed execution environments. Given a set of unit tests, CUT allocates appropriate computational resources, i.e., virtual machines or containers, and schedules the execution of tests over them. Developers do not need to change existing unit test code, and can easily control relevant aspects of test execution, including resource allocation and test scheduling. Additionally, during the execution CUT monitors and publishes events about the running tests which enables stream analytics.
CUT and videos showcasing its main features are freely available at: https://www.st.cs.uni-saarland.de/testing/cut/
@InProceedings{ISSTA17p364,
author = {Alessio Gambi and Sebastian Kappler and Johannes Lampel and Andreas Zeller},
title = {CUT: Automatic Unit Testing in the Cloud},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {364--367},
doi = {},
year = {2017},
}
XFix: An Automated Tool for the Repair of Layout Cross Browser Issues
Sonal Mahajan, Abdulmajeed Alameer, Phil McMinn, and
William G. J. Halfond
(University of Southern California, USA; University of Sheffield, UK)
Differences in the rendering of a website across different browsers can cause inconsistencies in its appearance and usability, resulting in Layout Cross Browser Issues (XBIs). Such XBIs can negatively impact the functionality of a website as well as users’ impressions of its trustworthiness and reliability. Existing techniques can only detect XBIs, and therefore require developers to manually perform the labor intensive task of repair. In this demo paper we introduce our tool, XFix, that automatically repairs layout XBIs in web applications. To the best of our knowledge, XFix is the first automated technique for generating XBI repairs.
@InProceedings{ISSTA17p368,
author = {Sonal Mahajan and Abdulmajeed Alameer and Phil McMinn and William G. J. Halfond},
title = {XFix: An Automated Tool for the Repair of Layout Cross Browser Issues},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {368--371},
doi = {},
year = {2017},
}
THEMIS: A Tool for Decentralized Monitoring Algorithms
Antoine El-Hokayem and Yliès Falcone
(Grenoble Alpes University, France; Inria, France; CNRS, France; Laboratoire d'Informatique de Grenoble, France)
THEMIS is a tool to facilitate the design, development, and analysis of decentralized monitoring algorithms; developed using Java and AspectJ. It consists of a library and command-line tools. THEMIS provides an API, data structures and measures for decentralized monitoring. These building blocks can be reused or extended to modify existing algorithms, design new more intricate algorithms, and elaborate new approaches to assess existing algorithms. We illustrate the usage of THEMIS by comparing two variants of a monitoring algorithm.
@InProceedings{ISSTA17p372,
author = {Antoine El-Hokayem and Yliès Falcone},
title = {THEMIS: A Tool for Decentralized Monitoring Algorithms},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {372--375},
doi = {},
year = {2017},
}
Info
JFIX: Semantics-Based Repair of Java Programs via Symbolic PathFinder
Xuan-Bach D. Le, Duc-Hiep Chu,
David Lo,
Claire Le Goues, and Willem Visser
(Singapore Management University, Singapore; IST, Austria; Carnegie Mellon University, USA; Stellenbosch University, South Africa)
Recently there has been a proliferation of automated program repair
(APR) techniques, targeting various programming languages. Such
techniques can be generally classified into two families: syntactic-
and semantics-based. Semantics-based APR, on which we focus,
typically uses symbolic execution to infer semantic constraints and
then program synthesis to construct repairs conforming to them.
While syntactic-based APR techniques have been shown success-
ful on bugs in real-world programs written in both C and Java, semantics-based APR techniques mostly target C programs. This leaves empirical comparisons of the APR families not fully explored, and developers without a Java-based semantics APR technique. We present JFix, a semantics-based APR framework that targets Java, and an associated Eclipse plugin. JFix is implemented atop Symbolic PathFinder, a well-known symbolic execution engine for Java programs. It extends one particular APR technique (Angelix), and is designed to be sufficiently generic to support a variety of such techniques. We demonstrate that semantics-based APR can indeed efficiently and effectively repair a variety of classes of bugs in large real-world Java programs. This supports our claim that the framework can both support developers seeking semantics-based repair of bugs in Java programs, as well as enable larger scale empirical studies comparing syntactic- and semantics-based APR targeting
Java. The demonstration of our tool is available via the project website at: https://xuanbachle.github.io/semanticsrepair/
@InProceedings{ISSTA17p376,
author = {Xuan-Bach D. Le and Duc-Hiep Chu and David Lo and Claire Le Goues and Willem Visser},
title = {JFIX: Semantics-Based Repair of Java Programs via Symbolic PathFinder},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {376--379},
doi = {},
year = {2017},
}
Info
ArtForm: A Tool for Exploring the Codebase of Form-Based Websites
Ben Spencer, Michael Benedikt,
Anders Møller, and Franck van Breugel
(University of Oxford, UK; Aarhus University, Denmark; York University, Canada)
We describe ArtForm, a tool for exploring the codebase of dynamic data-driven websites where users enter data via forms. ArtForm extends an instrumented browser, so it can directly implement user interactions, adding in symbolic and concolic execution of JavaScript. The tool supports a range of exploration modes with varying degrees of user intervention. It includes a number of adaptations of concolic execution to the setting of form-based web programs.
@InProceedings{ISSTA17p380,
author = {Ben Spencer and Michael Benedikt and Anders Møller and Franck van Breugel},
title = {ArtForm: A Tool for Exploring the Codebase of Form-Based Websites},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {380--383},
doi = {},
year = {2017},
}
Video
Info
ParTeCL: Parallel Testing using OpenCL
Vanya Yaneva, Ajitha Rajan, and Christophe Dubach
(University of Edinburgh, UK)
With the growing complexity of software, the number of test cases needed for effective validation is extremely large. Executing these large test suites is expensive and time consuming, putting an enormous pressure on the software development cycle. In previous work, we proposed using Graphics Processing Units (GPUs) to accelerate test execution by running test cases in parallel on the GPU threads. However, the complexity of GPU programming poses challenges to the usability and effectiveness of the proposed approach.
In this paper we present ParTeCL - a compiler-assisted framework to automatically generate GPU code from sequential programs and execute their tests in parallel on the GPU. We show feasibilitiy and performance achieved when executing test suites for 9 programs from an industry standard benchmark suite on the GPU. ParTeCL achieves an average speedup of 16× when compared to a single CPU for these benchmarks.
@InProceedings{ISSTA17p384,
author = {Vanya Yaneva and Ajitha Rajan and Christophe Dubach},
title = {ParTeCL: Parallel Testing using OpenCL},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {384--387},
doi = {},
year = {2017},
}
Verifying Digital Systems with MATLAB
Lennon Chaves, Iury Bessa, Lucas Cordeiro, Daniel Kroening, and Eddie Lima
(Federal University of Amazonas, Brazil; University of Oxford, UK; Samsung Electronics, Brazil)
A MATLAB toolbox is presented, with the goal of checking occurrences of
design errors typically found in fixed-point digital systems, considering
finite word-length effects. In particular, the present toolbox works as a
front-end to a recently introduced verification tool, known as
Digital-System Verifier (DSVerifier), and checks overflow, limit cycle, quantization,
stability, and minimum phase errors in digital systems represented by
transfer-function and state-space equations. It provides a command-line
version with simplified access to specific functionality and a graphical-user
interface, which was developed as a MATLAB application. The resulting
toolbox enables application of verification to real-world systems
by control engineers.
@InProceedings{ISSTA17p388,
author = {Lennon Chaves and Iury Bessa and Lucas Cordeiro and Daniel Kroening and Eddie Lima},
title = {Verifying Digital Systems with MATLAB},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {388--391},
doi = {},
year = {2017},
}
Video
Info
SealTest: A Simple Library for Test Sequence Generation
Sylvain Hallé and Raphaël Khoury
(Université du Québec à Chicoutimi, Canada)
SealTest is a Java library for generating test sequences based on a formal specification. It allows a user to easily define a wide range of coverage metrics using multiple specification languages. Its simple and generic architecture makes it a useful testing tool for dynamic software systems, as well as an appropriate research testbed for implementing and experimentally comparing test sequence generation algorithms.
@InProceedings{ISSTA17p392,
author = {Sylvain Hallé and Raphaël Khoury},
title = {SealTest: A Simple Library for Test Sequence Generation},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {392--395},
doi = {},
year = {2017},
}
Info
GitcProc: A Tool for Processing and Classifying GitHub Commits
Casey Casalnuovo, Yagnik Suchak, Baishakhi Ray, and
Cindy Rubio-González
(University of California at Davis, USA; University of Virginia, USA)
Sites such as GitHub have created a vast collection of software
artifacts that researchers interested in understanding and improving
software systems can use. Current tools for processing such GitHub data
tend to target project metadata and avoid source code processing, or
process source code in a manner that requires significant effort for
each language supported. This paper presents GitcProc, a lightweight
tool based on regular expressions and source code blocks, which
downloads projects and extracts their project history, including
fine-grained source code information and development time bug fixes.
GitcProc can track changes to both single-line and block source code
structures and associate these changes to the surrounding function
context with minimal set up required from users. We demonstrate
GitcProc's ability to capture changes in multiple languages by evaluating it on C,
C++, Java, and Python projects, and show it finds bug fixes and
the context of source code changes effectively with few false positives.
@InProceedings{ISSTA17p396,
author = {Casey Casalnuovo and Yagnik Suchak and Baishakhi Ray and Cindy Rubio-González},
title = {GitcProc: A Tool for Processing and Classifying GitHub Commits},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {396--399},
doi = {},
year = {2017},
}
LabPal: Repeatable Computer Experiments Made Easy
Sylvain Hallé
(Université du Québec à Chicoutimi, Canada)
LabPal is a Java library designed to easily create and run experiments on a computer. It provides a user-friendly web console, support for automated plotting, a pause-resume facility, a mechanism for handling data traceability and linking, and the possibility of saving all experiment input and output data in an open format. These functionalities greatly reduce the amount of boilerplate scripting needed to run experiments on a computer, and simplify their re-execution by independent parties.
@InProceedings{ISSTA17p404,
author = {Sylvain Hallé},
title = {LabPal: Repeatable Computer Experiments Made Easy},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {404--407},
doi = {},
year = {2017},
}
Video
Info
Doctoral Symposium
Analysis
Consistency Checking in Requirements Analysis
Jaroslav Bendík
(Masaryk University, Czech Republic)
In the last decade it became a common practise to formalise software requirements using a mathematical language of temporal logics, e.g., LTL. The formalisation removes ambiguity and improves understanding. Formal description also enables various model-based techniques, like formal verification. Moreover, we get the opportunity to check the requirements earlier, even before any system model is built. This so called requirements sanity checking aims to assure that a given set of requirements is consistent, i.e., that a product satisfying all the requirements can be developed. If inconsistencies are found, it is desirable to present them to the user in a minimal fashion, exposing the core problems among the requirements. Such cores are called minimal inconsistent subsets (MISes). In this work, we present a framework for online MISes enumeration in the domain of temporal logics.
@InProceedings{ISSTA17p408,
author = {Jaroslav Bendík},
title = {Consistency Checking in Requirements Analysis},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {408--411},
doi = {},
year = {2017},
}
Inferring Page Models for Web Application Analysis
Snigdha Athaiya
(IISc Bangalore, India)
Web applications are difficult to analyze using code-based tools because data-flow and control-flow through the application occurs via both server-side code and client-side pages. Client-side pages are typically specified in a scripting language that is different from the main server-side language; moreover, the pages are generated dynamically from the scripts. To address these issues we propose
a static-analysis approach that automatically constructs a "model" of each page in a given application. A page model is a code fragment in the same language as the server-side code, which faithfully over-approximates the possible elements of the page as well as the control-flows and data-flows due to these elements. The server-side code in conjunction with the page models then becomes a standard (non-web) program, thus amenable to analysis using standard code-based tools.
@InProceedings{ISSTA17p412,
author = {Snigdha Athaiya},
title = {Inferring Page Models for Web Application Analysis},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {412--415},
doi = {},
year = {2017},
}
Path Cost Analysis for Side Channel Detection
Tegan Brennan
(University of California at Santa Barbara, USA)
Side-channels have been increasingly demonstrated as a practical threat to the confidentiality of private user information. Being able to statically detect these kinds of vulnerabilites is a key challenge in current computer security research. We introduce a new technique, path-cost analysis (PCA), for the detection of side-channels. Given a cost model for a type of side-channel, path-cost analysis assigns a symbolic cost expression to every node and every back edge of a method's control flow graph that gives an over-approximation for all possible observable values at that node or after traversing that cycle. Queries to a satisfiability solver on the maximum distance between specific pairs of nodes allow us to detect the presence of imbalanced paths through the control flow graph. When combined with taint analysis, we are able to answer the following question: does there exist a pair of paths in the method's control flow graph, differing only on branch conditions influenced by the secret, that differs in observable value by more than some given threshold? In fact, we are able to answer the specifically state what sets of secret-sensitive conditional statements introduce a side-channel detectable given some noise parameter. We extend this approach to an interprocedural analysis, resulting in a over-approximation of the number of true side-channels in the program according to the given cost model. Greater precision can be obtained by combining our method with predicate abstraction or symbolic execution to eliminate a subset of the infeasible paths through the control flow graph. We propose evaluating our method on a set of sizeable Java server-client applications.
@InProceedings{ISSTA17p416,
author = {Tegan Brennan},
title = {Path Cost Analysis for Side Channel Detection},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {416--419},
doi = {},
year = {2017},
}
Modeling and Learning
Automatically Inferring and Enforcing User Expectations
Jenny Hotzkow
(Saarland University, Germany)
Can we automatically learn how users expect an application to behave? Yes, if we consider an application from the users perspective. Whenever presented with an unfamiliar app, the user not only regards the context presented by this particular application, but rather considers previous experiences from other applications. This research presents an approach to reflect this procedure by automatically learning user expectations from the semantic contexts over multiple applications. Once the user expectations are established, this knowledge can be used as an oracle, to test if an application follows the user’s expectations or entails surprising behavior by error or deliberately.
@InProceedings{ISSTA17p420,
author = {Jenny Hotzkow},
title = {Automatically Inferring and Enforcing User Expectations},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {420--423},
doi = {},
year = {2017},
}
Understanding Intended Behavior using Models of Low-Level Signals
Deborah S. Katz
(Carnegie Mellon University, USA)
As software systems increase in complexity and operate with less human
supervision, it becomes more difficult to use traditional techniques to detect
when software is not behaving as intended.
Furthermore, many systems operating today are nondeterministic and operate
in unpredictable environments, making it difficult to even define what constitutes
correct behavior.
I propose a family of novel techniques to model the behavior of executing
programs using low-level signals collected during executions.
The models provide a basis for predicting whether an execution of the program
or program unit under test represents intended behavior.
I have demonstrated success with these techniques for detecting faulty and
unexpected behavior on small programs.
I propose to extend the work to smaller units of large, complex programs.
@InProceedings{ISSTA17p424,
author = {Deborah S. Katz},
title = {Understanding Intended Behavior using Models of Low-Level Signals},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {424--427},
doi = {},
year = {2017},
}
Version Space Learning for Verification on Temporal Differentials
Mark Santolucito
(Yale University, USA)
Configuration files provide users with the ability to quickly alter the behavior of their software system. Ensuring that a configuration file does not induce errors in the software is a complex verification issue. The types of errors can be easy to measure, such as an initialization failure of system boot, or more insidious such as performance degrading over time under heavy network loads. In order to warn a user of potential configuration errors ahead of time, we propose using version space learning specifications for configuration languages. We frame an existing tool, ConfigC, in terms of version space learning. We extend that algorithm to leverage the temporal structuring available in training sets scraped from versioning control systems. We plan to evaluate our system on a case study using TravisCI configuration files collected from Github.
@InProceedings{ISSTA17p428,
author = {Mark Santolucito},
title = {Version Space Learning for Verification on Temporal Differentials},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {428--431},
doi = {},
year = {2017},
}
Testing
Data Flow Oriented UI Testing: Exploiting Data Flows and UI Elements to Test Android Applications
Nataniel P. Borges Jr.
(Saarland University, Germany)
Testing user interfaces (UIs) is a challenging task. Ideally, every sequence of UI elements should be tested to guarantee that the application works correctly. This is, however, unfeasible due to the number of UI elements in an application. A better approach is to limit the evaluation to UI elements that affect a specific functionality. In this paper I present a novel technique to identify the relation between UI elements using the statically extracted data flows. I also present a method to refine these relations using dynamic analysis, in order to ensure that relations extracted from unreachable data flows are removed. Using these relations it is possible to more efficiently test a functionality. Finally, I present an approach to evaluate how these UI-aware data flows can be used as an heuristic to measure test coverage.
@InProceedings{ISSTA17p432,
author = {Nataniel P. Borges Jr.},
title = {Data Flow Oriented UI Testing: Exploiting Data Flows and UI Elements to Test Android Applications},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {432--435},
doi = {},
year = {2017},
}
Dynamic Tainting for Automatic Test Case Generation
Björn Mathis
(Saarland University, Germany)
Dynamic tainting is an important part of modern software engineering research. State-of-the-art tools for debugging, bug detection and program analysis make use of this technique. Nonetheless, the research area based on dynamic tainting still has open questions, among others the automatic generation of program inputs.
My proposed work concentrates on the use of dynamic tainting for test case generation. The goal is the generation of complex and valid test inputs from scratch. Therefore, I use byte level taint information enhanced with additional static and dynamic program analysis. This information is used in an evolutionary algorithm to create new offsprings and mutations. Concretely, instead of crossing and mutating the whole input randomly, taint information can be used to define which parts of the input have to be mutated. Furthermore, the taint information may also be used to define evolutionary operators.
Eventually, the evolutionary algorithm is able to generate valid inputs for a program. Such inputs can be used together with the taint information for further program analysis, e.g. the generation of input grammars.
@InProceedings{ISSTA17p436,
author = {Björn Mathis},
title = {Dynamic Tainting for Automatic Test Case Generation},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {436--439},
doi = {},
year = {2017},
}
Mapping Hardness of Automated Software Testing
Carlos Oliveira
(Monash University, Australia)
Automated Test Case Generation (ATCG) is an important topic in Software Testing, with a wide range of techniques and tools being used in academia and industry. While their usefulness is widely recognized, due to the labor-intensive nature of the task, the effectiveness of the different techniques in automatically generating test cases for different software systems is not thoroughly understood. Despite many studies introducing various ATCG techniques, much remains to be learned, however, about what makes a particular technique work well (or not) for a specific software system. Therefore, we propose a new methodology to evaluate and select the most effective ATCG technique using structure-based complexity measures. Empirical tests are going to be performed using two different techniques: Search-based Software Testing (SBST) and Random Testing (RT).
@InProceedings{ISSTA17p440,
author = {Carlos Oliveira},
title = {Mapping Hardness of Automated Software Testing},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {440--443},
doi = {},
year = {2017},
}
Oracle Problem in Software Testing
Gunel Jahangirova
(Fondazione Bruno Kessler, Italy; University College London, UK)
The oracle problem remains one of the key challenges in software testing, for which little automated support has been developed so far. In my thesis work we introduce a technique for assessing and improving test oracles by reducing the incidence of both false positives and false negatives. Our technique combines test case generation to reveal false positives and mutation testing to reveal false negatives. The experimental results on five real-world subjects show that the fault detection rate of the oracles after improvement increases, on average, by 48.6% (86% over the implicit oracle). Three actual, exposed faults in the studied systems were subsequently confirmed and fixed by the developers. However, our technique contains a human in the loop, which was represented only by the author during the initial experiments. Our next goal is to conduct further experiments where the human in the loop will be represented by real developers. Our second future goal is to address the oracle placement problem. When testing software, developers can place oracles externally or internally to a method. Given a faulty execution state, i.e., one that differs from the expected one, an oracle might be unable to expose the fault if it is placed at a program point with no access to the incorrect program state or where the program state is no longer corrupted. In such a case, the oracle is subject to failed error propagation. Internal oracles are in principle less subject to failed error propagation than external oracles. However, they are also more difficult to define manually. Hence, a key research question is whether a more intrusive oracle placement is justified by its higher fault detection capability.
@InProceedings{ISSTA17p444,
author = {Gunel Jahangirova},
title = {Oracle Problem in Software Testing},
booktitle = {Proc.\ ISSTA},
publisher = {ACM},
pages = {444--447},
doi = {},
year = {2017},
}
proc time: 2.2