Powered by
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023),
July 17–21, 2023,
Seattle, WA, USA
Frontmatter
Papers
CydiOS: A Model-Based Testing Framework for iOS Apps
Shuohan Wu

, Jianfeng Li

, Hao Zhou

, Yongsheng Fang

, Kaifa Zhao

, Haoyu Wang

, Chenxiong Qian

, and
Xiapu Luo
(Hong Kong Polytechnic University, China; Xi’an Jiaotong University, China; Beijing University of Posts and Telecommunications, China; Huazhong University of Science and Technology, China; University of Hong Kong, China)
Publisher's Version
Published Artifact
Artifacts Available
Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and Beyond
Ensheng Shi

, Yanlin Wang

, Hongyu Zhang

, Lun Du

, Shi Han

, Dongmei Zhang

, and Hongbin Sun
(Xi’an Jiaotong University, China; Sun Yat-sen University, China; Chongqing University, China; Microsoft, China)
Publisher's Version
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity
Zhuo Chen

, Jie Liu

, Yubo Hu

, Lei Wu

, Yajin Zhou

, Yiling He

, Xianhao Liao

, Ke Wang

, Jinku Li

, and Zhan Qin
(Zhejiang University, China; Ant Group, China; Xidian University, China)
Publisher's Version
Published Artifact
Archive submitted (850 kB)
Artifacts Available
A Comprehensive Study on Quality Assurance Tools for Java
Han Liu

, Sen Chen

, Ruitao Feng

, Chengwei Liu

, Kaixuan Li

, Zhengzi Xu

, Liming Nie

, Yang Liu

, and Yixiang Chen
(East China Normal University, China; Tianjin University, China; UNSW, Australia; Nanyang Technological University, Singapore)
Publisher's Version
Who Judges the Judge: An Empirical Study on Online Judge Tests
Kaibo Liu

, Yudong Han

, Jie M. Zhang

,
Zhenpeng Chen 
,
Federica Sarro 
,
Mark Harman 
, Gang Huang

, and Yun Ma
(Peking University, China; King’s College London, UK; University College London, UK; National Key Laboratory of Data Space Technology and System, China)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Functional
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis
Kai Cheng

, Yaowen Zheng

, Tao Liu

, Le Guan

, Peng Liu

, Hong Li

, Hongsong Zhu

, Kejiang Ye

, and Limin Sun
(Shenzhen Institute of Advanced Technology at Chinese Academy of Sciences, China; Sangfor Technologies, China; Nanyang Technological University, Singapore; Pennsylvania State University, USA; University of Georgia, USA; Institute of Information Engineering at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
Publisher's Version
Published Artifact
Info
Artifacts Available
Artifacts Reusable
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
Ningyu He

, Zhehao Zhao

, Jikai Wang

, Yubin Hu

, Shengjian Guo

, Haoyu Wang

, Guangtai Liang

, Ding Li

, Xiangqun Chen

, and Yao Guo
(Peking University, China; Huazhong University of Science and Technology, China; Beijing University of Posts and Telecommunications, China; Baidu Security, USA; Huawei Cloud Computing Technologies, China)
Publisher's Version
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators
Jingyi Shi

, Yang Xiao

, Yuekang Li

, Yeting Li

, Dongsong Yu

, Chendong Yu

, Hui Su

, Yufeng Chen

, and Wei Huo
(Institute of Information Engineering at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; UNSW, Australia; Zhongguancun Laboratory, China)
Publisher's Version
CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems
Quan Zhang

, Yongqiang Tian

,
Yifeng Ding 
, Shanshan Li

, Chengnian Sun

,
Yu Jiang 
, and Jiaguang Sun
(Tsinghua University, China; University of Waterloo, Canada; University of Illinois at Urbana-Champaign, USA; National University of Defense Technology, China)
Publisher's Version
Simulation-Based Validation for Autonomous Driving Systems
Changwen Li

, Joseph Sifakis

, Qiang Wang

, Rongjie Yan

, and
Jian Zhang
(Institute of Software at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; University Grenoble Alpes, France; CNRS, France; Grenoble INP, France; VERIMAG, France; Academy of Military Sciences, China)
Publisher's Version
Published Artifact
Artifacts Available
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing
Songtao Yang

, Yubo He

, Kaixiang Chen

, Zheyu Ma

,
Xiapu Luo 
, Yong Xie

, Jianjun Chen

, and Chao Zhang
(Tsinghua University, China; Information Engineering University, China; Hong Kong Polytechnic University, China; Qinghai University, China)
Publisher's Version
GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing
Zihan Wang

, Pengbo Nie

, Xinyuan Miao

, Yuting Chen

, Chengcheng Wan

, Lei Bu

, and Jianjun Zhao
(Shanghai Jiao Tong University, China; East China Normal University, China; Nanjing University, China; Kyushu University, Japan)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Reusable
Guiding Greybox Fuzzing with Mutation Testing
Vasudev Vikram

, Isabella Laybourn

, Ao Li

, Nicole Nair

, Kelton OBrien

, Rafaello Sanna

, and
Rohan Padhye
(Carnegie Mellon University, USA; Swarthmore College, USA; University of Minnesota, USA; University of Rochester, USA)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Functional
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis
Xiangzhe Xu

, Shiwei Feng

, Yapeng Ye

, Guangyu Shen

, Zian Su

, Siyuan Cheng

, Guanhong Tao

, Qingkai Shi

, Zhuo Zhang

, and
Xiangyu Zhang
(Purdue University, USA)
Publisher's Version
Published Artifact
Artifacts Available
Artifacts Reusable
Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts
Yuzhou Fang

, Daoyuan Wu

, Xiao Yi

, Shuai Wang

, Yufan Chen

, Mengjie Chen

, Yang Liu

, and Lingxiao Jiang
(Hong Kong University of Science and Technology, China; Chinese University of Hong Kong, China; Xidian University, China; Mask Network, China; Nanyang Technological University, Singapore; Singapore Management University, Singapore)
Publisher's Version
Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing
Julia Kaiwen Lau

, Kelvin Kai Wen Kong

, Julian Hao Yong

, Per Hoong Tan

,
Zhou Yang 
, Zi Qian Yong

, Joshua Chern Wey Low

,
Chun Yong Chong 
,
Mei Kuan Lim 
, and
David Lo
(Monash University Malaysia, Malaysia; Singapore Management University, Singapore)
Publisher's Version
Info
Enhancing REST API Testing with NLP Techniques
Myeongsoo Kim 
, Davide Corradini

, Saurabh Sinha

,
Alessandro Orso 
, Michele Pasqua

,
Rachel Tzoref-Brill 
, and Mariano Ceccato
(Georgia Institute of Technology, USA; University of Verona, Italy; IBM Research, USA; IBM Research, Israel)
Publisher's Version
Published Artifact
Artifacts Available
How Effective Are Neural Networks for Fixing Security Vulnerabilities
Yi Wu

, Nan Jiang

,
Hung Viet Pham 
, Thibaud Lutellier

, Jordan Davis

,
Lin Tan 
, Petr Babkin

, and Sameena Shah
(Purdue University, USA; York University, Canada; University of Alberta, Canada; J.P. Morgan AI Research, USA)
Publisher's Version
An Empirical Study of Functional Bugs in Android Apps
Yiheng Xiong

, Mengqian Xu

, Ting Su

, Jingling Sun

, Jue Wang

, He Wen

, Geguang Pu

, Jifeng He

, and Zhendong Su
(East China Normal University, China; Nanjing University, China; ETH Zurich, Switzerland)
Publisher's Version
An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software
Chao Li

, Rui Chen

, Boxiang Wang

, Zhixuan Wang

, Tingting Yu

, Yunsong Jiang

, Bin Gu

, and Mengfei Yang
(Beijing Institute of Control Engineering, China; Beijing Sunwise Information Technology, China; Xidian University, China; China Academy of Space Technology, China)
Publisher's Version
Tool Demonstrations
KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and Optimization
Qinglong Wang

, Runzhe Wang

, Yuxi Hu

, Xiaohai Shi

, Zheng Liu

, Tao Ma

, Houbing Song

, and Heyuan Shi
(Alibaba Group, China; University of Maryland, Baltimore County, USA; Central South University, China)
Publisher's Version
Video
Info
Doctoral Symposium
Late PhD Students
Early PhD Students
proc time: 23.46