Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Hypertesting of Programs: Theoretical Foundation and Automated Test Generation
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 115, Pages 1–12https://doi.org/10.1145/3597503.3640323Hyperproperties are used to define correctness requirements that involve relations between multiple program executions. This allows, for instance, to model security and concurrency requirements, which cannot be expressed by means of trace properties.
In ...
- research-articleApril 2024
DeepSample: DNN sampling-based testing for operational accuracy assessment
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 120, Pages 1–12https://doi.org/10.1145/3597503.3639584Deep Neural Networks (DNN) are core components for classification and regression tasks of many software systems. Companies incur in high costs for testing DNN with datasets representative of the inputs expected in operation, as these need to be manually ...
- research-articleApril 2024
Exploiting Library Vulnerability via Migration Based Automating Test Generation
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 228, Pages 1–12https://doi.org/10.1145/3597503.3639583In software development, developers extensively utilize third-party libraries to avoid implementing existing functionalities. When a new third-party library vulnerability is disclosed, project maintainers need to determine whether their projects are ...
Automatically Detecting Reflow Accessibility Issues in Responsive Web Pages
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 147, Pages 1–13https://doi.org/10.1145/3597503.3639229Many web applications today use responsive design to adjust the view of web pages to match the screen size of end users. People with disabilities often use an alternative view either due to zooming on a desktop device to enlarge text or viewing within a ...
- research-articleApril 2024
Barriers for Students During Code Change Comprehension
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 196, Pages 1–13https://doi.org/10.1145/3597503.3639227Modern code review (MCR) is a key practice for many software engineering organizations, so undergraduate software engineering courses often teach some form of it to prepare students. However, research on MCR describes how many its professional ...
-
Safeguarding DeFi Smart Contracts against Oracle Deviations
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 171, Pages 1–12https://doi.org/10.1145/3597503.3639225This paper presents OVer, a framework designed to automatically analyze the behavior of decentralized finance (DeFi) protocols when subjected to a "skewed" oracle input. OVer firstly performs symbolic analysis on the given contract and constructs a model ...
- research-articleApril 2024
Evaluating Large Language Models in Class-Level Code Generation
- Xueying Du,
- Mingwei Liu,
- Kaixin Wang,
- Hanlin Wang,
- Junwei Liu,
- Yixuan Chen,
- Jiayi Feng,
- Chaofeng Sha,
- Xin Peng,
- Yiling Lou
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 81, Pages 1–13https://doi.org/10.1145/3597503.3639219Recently, many large language models (LLMs) have been proposed, showing advanced proficiency in code generation. Meanwhile, many efforts have been dedicated to evaluating LLMs on code generation benchmarks such as HumanEval. Although being very helpful ...
- research-articleApril 2024
Learning in the Wild: Towards Leveraging Unlabeled Data for Effectively Tuning Pre-trained Code Models
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 80, Pages 1–13https://doi.org/10.1145/3597503.3639216Pre-trained code models have recently achieved substantial improvements in many code intelligence tasks. These models are first pre-trained on large-scale unlabeled datasets in a task-agnostic manner using self-supervised learning, and then fine-tuned on ...
- research-articleApril 2024
DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 221, Pages 1–12https://doi.org/10.1145/3597503.3639215Functional code clone detection is important for software maintenance. In recent years, deep learning techniques are introduced to improve the performance of functional code clone detectors. By representing each code snippet as a vector containing its ...
Fast Deterministic Black-box Context-free Grammar Inference
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 117, Pages 1–12https://doi.org/10.1145/3597503.3639214Black-box context-free grammar inference is a hard problem as in many practical settings it only has access to a limited number of example programs. The state-of-the-art approach Arvada heuristically generalizes grammar rules starting from flat parse ...
Finding XPath Bugs in XML Document Processors via Differential Testing
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 145, Pages 1–12https://doi.org/10.1145/3597503.3639208Extensible Markup Language (XML) is a widely used file format for data storage and transmission. Many XML processors support XPath, a query language that enables the extraction of elements from XML documents. These systems can be affected by logic bugs, ...
- research-articleApril 2024
MetaLog: Generalizable Cross-System Anomaly Detection from Logs with Meta-Learning
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 154, Pages 1–12https://doi.org/10.1145/3597503.3639205Log-based anomaly detection plays a crucial role in ensuring the stability of software. However, current approaches for log-based anomaly detection heavily depend on a vast amount of labeled historical data, which is often unavailable in many real-world ...
Extrapolating Coverage Rate in Greybox Fuzzing
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 132, Pages 1–12https://doi.org/10.1145/3597503.3639198A fuzzer can literally run forever. However, as more resources are spent, the coverage rate continuously drops, and the utility of the fuzzer declines. To tackle this coverage-resource tradeoff, we could introduce a policy to stop a campaign whenever the ...
- research-articleApril 2024
Mining Pull Requests to Detect Process Anomalies in Open Source Software Development
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 194, Pages 1–13https://doi.org/10.1145/3597503.3639196Trustworthy Open Source Software (OSS) development processes are the basis that secures the long-term trustworthiness of software projects and products. With the aim to investigate the trustworthiness of the Pull Request (PR) process, the common model of ...
- research-articleApril 2024
ChatGPT Incorrectness Detection in Software Reviews
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 180, Pages 1–12https://doi.org/10.1145/3597503.3639194We conducted a survey of 135 software engineering (SE) practitioners to understand how they use Generative AI-based chatbots like ChatGPT for SE tasks. We find that they want to use ChatGPT for SE tasks like software library selection but often worry ...
- research-articleApril 2024
MultiTest: Physical-Aware Object Insertion for Testing Multi-sensor Fusion Perception Systems
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 139, Pages 1–13https://doi.org/10.1145/3597503.3639191Multi-sensor fusion stands as a pivotal technique in addressing numerous safety-critical tasks and applications, e.g., self-driving cars and automated robotic arms. With the continuous advancement in data-driven artificial intelligence (AI), MSF's ...
FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 142, Pages 1–13https://doi.org/10.1145/3597503.3639190In decentralized finance (DeFi), lenders can offer flash loans to borrowers, i.e., loans that are only valid within a blockchain transaction and must be repaid with fees by the end of that transaction. Unlike normal loans, flash loans allow borrowers to ...
Translation Validation for JIT Compiler in the V8 JavaScript Engine
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 178, Pages 1–12https://doi.org/10.1145/3597503.3639189We present TurboTV, a translation validator for the JavaScript (JS) just-in-time (JIT) compiler of V8. While JS engines have become a crucial part of various software systems, their emerging adaption of JIT compilation makes it increasingly challenging ...
- research-articleApril 2024
An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 210, Pages 1–13https://doi.org/10.1145/3597503.3639186Unmanned aerial vehicles (UAVs) are becoming increasingly ubiquitous in our daily lives. However, like many other complex systems, UAVs are susceptible to software bugs that can lead to abnormal system behaviors and undesirable consequences. It is ...
- research-articleApril 2024
ReFAIR: Toward a Context-Aware Recommender for Fairness Requirements Engineering
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 213, Pages 1–12https://doi.org/10.1145/3597503.3639185Machine learning (ML) is increasingly being used as a key component of most software systems, yet serious concerns have been raised about the fairness of ML predictions. Researchers have been proposing novel methods to support the development of fair ...