Powered by
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023),
July 17–21, 2023,
Seattle, WA, USA
Frontmatter
Papers
CydiOS: A Model-Based Testing Framework for iOS Apps
Shuohan Wu,
Jianfeng Li,
Hao Zhou,
Yongsheng Fang,
Kaifa Zhao,
Haoyu Wang,
Chenxiong Qian, and
Xiapu Luo
(Hong Kong Polytechnic University, China; Xi’an Jiaotong University, China; Beijing University of Posts and Telecommunications, China; Huazhong University of Science and Technology, China; University of Hong Kong, China)
Publisher's Version
Published Artifact
Artifacts Available
Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and Beyond
Ensheng Shi,
Yanlin Wang,
Hongyu Zhang,
Lun Du,
Shi Han,
Dongmei Zhang, and
Hongbin Sun
(Xi’an Jiaotong University, China; Sun Yat-sen University, China; Chongqing University, China; Microsoft, China)
Publisher's Version
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity
Zhuo Chen,
Jie Liu,
Yubo Hu,
Lei Wu,
Yajin Zhou,
Yiling He,
Xianhao Liao,
Ke Wang,
Jinku Li, and
Zhan Qin
(Zhejiang University, China; Ant Group, China; Xidian University, China)
Publisher's Version
Published Artifact
Archive submitted (850 kB)
Artifacts Available
A Comprehensive Study on Quality Assurance Tools for Java
Han Liu,
Sen Chen,
Ruitao Feng,
Chengwei Liu,
Kaixuan Li,
Zhengzi Xu,
Liming Nie,
Yang Liu, and
Yixiang Chen
(East China Normal University, China; Tianjin University, China; UNSW, Australia; Nanyang Technological University, Singapore)
Publisher's Version
Who Judges the Judge: An Empirical Study on Online Judge Tests
Kaibo Liu,
Yudong Han,
Jie M. Zhang,
Zhenpeng Chen,
Federica Sarro,
Mark Harman,
Gang Huang, and
Yun Ma
(Peking University, China; King’s College London, UK; University College London, UK; National Key Laboratory of Data Space Technology and System, China)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Functional
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis
Kai Cheng,
Yaowen Zheng,
Tao Liu,
Le Guan,
Peng Liu,
Hong Li,
Hongsong Zhu,
Kejiang Ye, and
Limin Sun
(Shenzhen Institute of Advanced Technology at Chinese Academy of Sciences, China; Sangfor Technologies, China; Nanyang Technological University, Singapore; Pennsylvania State University, USA; University of Georgia, USA; Institute of Information Engineering at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
Publisher's Version
Published Artifact
Info
Artifacts Available
Artifacts Reusable
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
Ningyu He,
Zhehao Zhao,
Jikai Wang,
Yubin Hu,
Shengjian Guo,
Haoyu Wang,
Guangtai Liang,
Ding Li,
Xiangqun Chen, and
Yao Guo
(Peking University, China; Huazhong University of Science and Technology, China; Beijing University of Posts and Telecommunications, China; Baidu Security, USA; Huawei Cloud Computing Technologies, China)
Publisher's Version
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators
Jingyi Shi,
Yang Xiao,
Yuekang Li,
Yeting Li,
Dongsong Yu,
Chendong Yu,
Hui Su,
Yufeng Chen, and
Wei Huo
(Institute of Information Engineering at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; UNSW, Australia; Zhongguancun Laboratory, China)
Publisher's Version
CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems
Quan Zhang,
Yongqiang Tian,
Yifeng Ding,
Shanshan Li,
Chengnian Sun,
Yu Jiang, and
Jiaguang Sun
(Tsinghua University, China; University of Waterloo, Canada; University of Illinois at Urbana-Champaign, USA; National University of Defense Technology, China)
Publisher's Version
Simulation-Based Validation for Autonomous Driving Systems
Changwen Li,
Joseph Sifakis,
Qiang Wang,
Rongjie Yan, and
Jian Zhang
(Institute of Software at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; University Grenoble Alpes, France; CNRS, France; Grenoble INP, France; VERIMAG, France; Academy of Military Sciences, China)
Publisher's Version
Published Artifact
Artifacts Available
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing
Songtao Yang,
Yubo He,
Kaixiang Chen,
Zheyu Ma,
Xiapu Luo,
Yong Xie,
Jianjun Chen, and
Chao Zhang
(Tsinghua University, China; Information Engineering University, China; Hong Kong Polytechnic University, China; Qinghai University, China)
Publisher's Version
GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing
Zihan Wang,
Pengbo Nie,
Xinyuan Miao,
Yuting Chen,
Chengcheng Wan,
Lei Bu, and
Jianjun Zhao
(Shanghai Jiao Tong University, China; East China Normal University, China; Nanjing University, China; Kyushu University, Japan)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Reusable
Guiding Greybox Fuzzing with Mutation Testing
Vasudev Vikram,
Isabella Laybourn,
Ao Li,
Nicole Nair,
Kelton OBrien,
Rafaello Sanna, and
Rohan Padhye
(Carnegie Mellon University, USA; Swarthmore College, USA; University of Minnesota, USA; University of Rochester, USA)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Functional
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis
Xiangzhe Xu,
Shiwei Feng,
Yapeng Ye,
Guangyu Shen,
Zian Su,
Siyuan Cheng,
Guanhong Tao,
Qingkai Shi,
Zhuo Zhang, and
Xiangyu Zhang
(Purdue University, USA)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Reusable
Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts
Yuzhou Fang,
Daoyuan Wu,
Xiao Yi,
Shuai Wang,
Yufan Chen,
Mengjie Chen,
Yang Liu, and
Lingxiao Jiang
(Hong Kong University of Science and Technology, China; Chinese University of Hong Kong, China; Xidian University, China; Mask Network, China; Nanyang Technological University, Singapore; Singapore Management University, Singapore)
Publisher's Version
Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing
Julia Kaiwen Lau,
Kelvin Kai Wen Kong,
Julian Hao Yong,
Per Hoong Tan,
Zhou Yang,
Zi Qian Yong,
Joshua Chern Wey Low,
Chun Yong Chong,
Mei Kuan Lim, and
David Lo
(Monash University Malaysia, Malaysia; Singapore Management University, Singapore)
Publisher's Version
Info
Enhancing REST API Testing with NLP Techniques
Myeongsoo Kim,
Davide Corradini,
Saurabh Sinha,
Alessandro Orso,
Michele Pasqua,
Rachel Tzoref-Brill, and
Mariano Ceccato
(Georgia Institute of Technology, USA; University of Verona, Italy; IBM Research, USA; IBM Research, Israel)
Publisher's Version
Published Artifact
Artifacts Available
How Effective Are Neural Networks for Fixing Security Vulnerabilities
Yi Wu,
Nan Jiang,
Hung Viet Pham,
Thibaud Lutellier,
Jordan Davis,
Lin Tan,
Petr Babkin, and
Sameena Shah
(Purdue University, USA; York University, Canada; University of Alberta, Canada; J.P. Morgan AI Research, USA)
Publisher's Version
An Empirical Study of Functional Bugs in Android Apps
Yiheng Xiong,
Mengqian Xu,
Ting Su,
Jingling Sun,
Jue Wang,
He Wen,
Geguang Pu,
Jifeng He, and
Zhendong Su
(East China Normal University, China; Nanjing University, China; ETH Zurich, Switzerland)
Publisher's Version
An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software
Chao Li,
Rui Chen,
Boxiang Wang,
Zhixuan Wang,
Tingting Yu,
Yunsong Jiang,
Bin Gu, and
Mengfei Yang
(Beijing Institute of Control Engineering, China; Beijing Sunwise Information Technology, China; Xidian University, China; China Academy of Space Technology, China)
Publisher's Version
Tool Demonstrations
KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and Optimization
Qinglong Wang,
Runzhe Wang,
Yuxi Hu,
Xiaohai Shi,
Zheng Liu,
Tao Ma,
Houbing Song, and
Heyuan Shi
(Alibaba Group, China; University of Maryland, Baltimore County, USA; Central South University, China)
Publisher's Version
Video
Info
Doctoral Symposium
Late PhD Students
Early PhD Students
proc time: 18.57