Powered by
33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024),
September 16–20, 2024,
Vienna, Austria
Frontmatter
Papers Round 1
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor
Zhenyu Ye
, Lei Zhou
, Fengwei Zhang
, Wenqiang Jin
, Zhenyu Ning
, Yupeng Hu
, and Zheng Qin
(Hunan University, China; National University of Defense Technology, China; Southern University of Science and Technology, China; Xinchuang Haihe Laboratory, China)
Article Search
Enhancing ROS System Fuzzing through Callback Tracing
Yuheng Shen
, Jianzhong Liu
, Yiru Xu
, Hao Sun
, Mingzhe Wang
, Heyuan Shi
, Nan Guan
, and
Yu Jiang
(Tsinghua University, China; ETH Zurich, Switzerland; Central South University, China; City University of Hong Kong, China)
Article Search
Total Recall? How Good Are Static Call Graphs Really?
Dominik Helm
, Sven Keidel
, Anemone Kampkötter
, Johannes Düsing
, Tobias Roth
, Ben Hermann
, and
Mira Mezini
(TU Darmstadt, Germany; National Research Center for Applied Cybersecurity ATHENE, Germany; TU Dortmund, Germany; hessian.AI, Germany)
Article Search
Artifacts Available
DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3
Zhiying Wu
, Jiajing Wu
, Hui Zhang
, Ziwei Li
, Jiachi Chen
, Zibin Zheng
, Qing Xia
, Gang Fan
, and Yi Zhen
(Sun Yat-sen University, China; Institute of Software at Chinese Academy of Sciences, China; n.n., China)
Article Search
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models
Mingyi Zhou
, Xiang Gao
, Pei Liu
, John Grundy
, Chunyang Chen
, Xiao Chen
, and Li Li
(Monash University, Australia; Beihang University, China; CSIRO’s Data61, Australia; TU Munich, Germany; University of Newcastle, Australia)
Article Search
Artifacts Available
UPBEAT: Test Input Checks of Q# Quantum Libraries
Tianmin Hu
, Guixin Ye
, Zhanyong Tang
, Shin Hwei Tan
, Huanting Wang
, Meng Li
, and
Zheng Wang
(Northwest University, China; Concordia University, Canada; University of Leeds, United Kingdom; Hefei University of Technology, China)
Article Search
A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We?
Zhihan Jiang
, Jinyang Liu
, Junjie Huang
, Yichen Li
, Yintong Huo
, Jiazhen Gu
, Zhuangbin Chen
, Jieming Zhu
, and Michael R. Lyu
(Chinese University of Hong Kong, China; Sun Yat-sen University, China; Huawei Noah’s Ark Lab, China)
Article Search
Define-Use Guided Path Exploration for Better Forced Execution
Dongnan He
, Dongchen Xie
, Yujie Wang
, Wei You
, Bin Liang
, Jianjun Huang
, Wenchang Shi
, Zhuo Zhang
, and
Xiangyu Zhang
(Renmin University of China, China; Purdue University, USA)
Article Search
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion
Qi Guo
, Xiaohong Li
,
Xiaofei Xie , Shangqing Liu
, Ze Tang
, Ruitao Feng
, Junjie Wang
, Jidong Ge
, and Lei Bu
(Tianjin University, China; Singapore Management University, Singapore; Nanyang Technological University, Singapore; Nanjing University, Nanjing, China; Nanjing University, China)
Article Search
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Zhaoyang Chu
, Yao Wan
, Qian Li
, Yang Wu
, Hongyu Zhang
, Yulei Sui
, Guandong Xu
, and Hai Jin
(Huazhong University of Science and Technology, China; Curtin University, Perth, Australia; Chongqing University, China; UNSW, Sydney, Australia; University of Technology, Sydney, Australia)
Article Search
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications
Maoyi Xie , Ming Hu
, Ziqiao Kong
, Cen Zhang
, Yebo Feng
, Haijun Wang
, Yue Xue
, Hao Zhang
, Ye Liu
, and Yang Liu
(Nanyang Technological University, Singapore; Xi'an Jiaotong University, China; MetaTrust Labs, n.n.)
Article Search
Info
Silent Taint-Style Vulnerability Fixes Identification
Zhongzhen Wen
, Jiayuan Zhou
,
Minxue Pan , Shaohua Wang
, Xing Hu
, Tongtong Xu
, Tian Zhang
, and Xuandong Li
(Nanjing University, China; Huawei, Waterloo, Canada; Central University of Finance and Economics, China; Zhejiang University, China; Huawei, China)
Article Search
CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature
Chenyan Liu
, Yufan Cai
, Yun Lin
, Yuhuan Huang
, Yunrui Pei
, Bo Jiang
, Ping Yang
, Jin Song Dong
, and Hong Mei
(Shanghai Jiao Tong University, China; National University of Singapore, Singapore; Bytedance Network Technology, Beijing, China)
Article Search
CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision
Hao Wang , Zeyu Gao
, Chao Zhang
, Zihan Sha
, Mingyang Sun
, Yuchen Zhou
, Wenyu Zhu
, Wenju Sun
, Han Qiu
, and Xi Xiao
(Tsinghua University, China; Information Engineering University, China; University of Electronic Science and Technology of China, China; Beijing University of Technology, China)
Preprint
proc time: 8.39