Powered by
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023),
July 17–21, 2023,
Seattle, WA, United States
Frontmatter
Papers
CydiOS: A Model-Based Testing Framework for iOS Apps
Shuohan Wu

, Jianfeng Li

, Hao Zhou

, Yongsheng Fang

, Kaifa Zhao

, Haoyu Wang

, Chenxiong Qian

, and
Xiapu Luo
(Hong Kong Polytechnic University, China; Xi’an Jiaotong University, China; Beijing University of Posts and Telecommunications, China; Huazhong University of Science and Technology, China; University of Hong Kong, China)
Article Search
CONCORD: Clone-Aware Contrastive Learning for Source Code
Yangruibo Ding 
, Saikat Chakraborty

, Luca Buratti

, Saurabh Pujar

, Alessandro Morari

, Gail Kaiser

, and
Baishakhi Ray
(Columbia University, USA; Microsoft Research, USA; IBM Research, USA; IBM, USA)
Article Search
Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and Beyond
Ensheng Shi, Yanlin Wang

, Hongyu Zhang

, Lun Du, Shi Han

, Dongmei Zhang

, and Hongbin Sun
(Xi’an Jiaotong University, China; Sun Yat-sen University, China; University of Newcastle, Australia; Microsoft Research, China)
Article Search
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity
Zhuo Chen

, Jie Liu

, Yubo Hu

, Lei Wu

, Yajin Zhou

, Yiling He

, Xianhao Liao

, Ke Wang

, Jinku Li

, and Zhan Qin
(Zhejiang University, China; Ant Group, China; Xidian University, China)
Article Search
A Comprehensive Study on Quality Assurance Tools for Java
Han Liu

, Sen Chen

, Ruitao Feng

, Chengwei Liu

, Kaixuan Li

, Zhengzi Xu

, Liming Nie

,
Yang Liu 
, and Yixiang Chen
(East China Normal University, China; Tianjin University, China; UNSW, Australia; Nanyang Technological University, Singapore)
Article Search
Who Judges the Judge: An Empirical Study on Online Judge Tests
Kaibo Liu

, Yudong Han

, Jie M. Zhang

,
Zhenpeng Chen 
,
Federica Sarro 
,
Mark Harman 
, Gang Huang

, and Yun Ma
(Peking University, China; King’s College London, UK; University College London, UK; National Key Laboratory of Data Space Technology and System, China)
Article Search
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis
Kai Cheng

, Yaowen Zheng

, Tao Liu

, Le Guan

, Peng Liu

, Hong Li

, Hongsong Zhu

, Kejiang Ye

, and Limin Sun
(Shenzhen Institute of Advanced Technology at Chinese Academy of Sciences, China; Sangfor Technologies, China; Nanyang Technological University, Singapore; Pennsylvania State University, USA; University of Georgia, USA; Institute of Information Engineering at Chinese Academy of Sciences, China)
Article Search
Info
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
Ningyu He

, Zhehao Zhao

, Jikai Wang

, Yubin Hu

, Shengjian Guo

, Haoyu Wang

, Guangtai Liang

, Ding Li

, Xiangqun Chen

, and Yao Guo
(Peking University, China; Huazhong University of Science and Technology, China; Beijing University of Posts and Telecommunications, China; Baidu Security, USA; Huawei Cloud Computing Technologies, China)
Article Search
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators
Jingyi Shi

, Yang Xiao

, Yuekang Li

, Yeting Li

, DongSong Yu

, Chendong Yu

, Hui Su

, Yufeng Chen

, and Wei Huo
(Chinese Academy of Sciences, China; Nanyang Technological University, Singapore; Zhongguancun Laboratory, China; Institute of Information Engineering at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; Beijing Key Laboratory of Network Security and Protection Technology, China; University of Electronic Science and Technology of China, China)
Article Search
CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems
Quan Zhang

, Yongqiang Tian

,
Yifeng Ding 
, Shanshan Li

, Chengnian Sun

,
Yu Jiang 
, and Jiaguang Sun
(Tsinghua University, China; University of Waterloo, Canada; University of Illinois at Urbana-Champaign, USA; National University of Defense Technology, China)
Article Search
Simulation-Based Validation for Autonomous Driving Systems
Changwen Li

, Joseph Sifakis

, Qiang Wang

, Rongjie Yan

, and
Jian Zhang
(Institute of Software at Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; University Grenoble Alpes, France; CNRS, France; Grenoble INP, France; VERIMAG, France; Academy of Military Sciences, China)
Article Search
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing
Songtao Yang

, Yubo He

, Kaixiang Chen

, Zheyu Ma

,
Xiapu Luo 
, Yong Xie

, Jianjun Chen

, and Chao Zhang
(Tsinghua University, China; Information Engineering University, China; Hong Kong Polytechnic University, China; Qinghai University, China)
Article Search
GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing
Zihan Wang

, Pengbo Nie

, Xinyuan Miao

, Yuting Chen

, Chengcheng Wan

, Lei Bu

, and Jianjun Zhao
(Shanghai Jiao Tong University, China; East China Normal University, China; Nanjing University, China; Kyushu University, Japan)
Article Search
Guiding Greybox Fuzzing with Mutation Testing
Vasudev Vikram

, Isabella Laybourn

, Ao Li

, Nicole Nair

, Kelton OBrien

, Rafaello Sanna

, and
Rohan Padhye
(Carnegie Mellon University, USA; Swarthmore College, USA; University of Minnesota, USA; University of Rochester, USA)
Article Search
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis
Xiangzhe Xu

, Shiwei Feng

, Yapeng Ye

, Guangyu Shen

, Zian Su

, Siyuan Cheng

, Guanhong Tao

, Qingkai Shi

, Zhuo Zhang

, and
Xiangyu Zhang
(Purdue University, USA)
Article Search
Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts
Yuzhou Fang

, Daoyuan Wu

, Xiao Yi

, Shuai Wang

, Yufan Chen

, Mengjie Chen

,
Yang Liu 
, and Lingxiao Jiang
(Hong Kong University of Science and Technology, China; Chinese University of Hong Kong, China; Xidian University, China; Mask Network, China; Nanyang Technological University, Singapore; Singapore Management University, Singapore)
Article Search
Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing
Julia Kaiwen Lau

, Kelvin Kai Wen Kong

, Julian Hao Yong

, Per Hoong Tan

,
Zhou Yang 
, Zi Qian Yong

, Joshua Chern Wey Low

,
Chun Yong Chong 
,
Mei Kuan Lim 
, and
David Lo
(Monash University Malaysia, Malaysia; Singapore Management University, Singapore)
Article Search
Info
Enhancing REST API Testing with NLP Techniques
Myeongsoo Kim 
, Davide Corradini, Michele Pasqua, Mariano Ceccato

,
Alessandro Orso 
, Saurabh Sinha

, and
Rachel Tzoref-Brill
(Georgia Institute of Technology, USA; University of Verona, Italy; IBM Research, USA; IBM Research, Israel)
Article Search
How Effective Are Neural Networks for Fixing Security Vulnerabilities
Yi Wu

, Nan Jiang

,
Hung Viet Pham 
, Thibaud Lutellier

, Jordan Davis

,
Lin Tan 
, Petr Babkin

, and Sameena Shah
(Purdue University, USA; University of Waterloo, Canada; University of Alberta, Canada; J.P. Morgan AI Research, USA)
Article Search
Rare Path Guided Fuzzing
Seemanta Saha

, Laboni Sarker

, Md Shafiuzzaman

, Chaofan Shou

, Albert Li

, Ganesh Sankaran

, and Tevfik Bultan
(University of California at Santa Barbara, USA)
Article Search
An Empirical Study of Functional Bugs in Android Apps
Yiheng Xiong, Mengqian Xu, Ting Su

, Jingling Sun

,
Jue Wang 
, He Wen, Geguang Pu, Jifeng He, and Zhendong Su
(East China Normal University, China; Nanjing University, China; ETH Zurich, Switzerland)
Article Search
An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software
Chao Li

, Rui Chen

, Boxiang Wang

, Zhixuan Wang

, Tingting Yu

, Yunsong Jiang

, and Mengfei Yang
(Beijing Institute of Control Engineering, China; Beijing Sunwise Information Technology, China; Xidian University, China; China Academy of Space Technology, China)
Article Search
proc time: 4.92