Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/114192
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorZhang, H-
dc.creatorPei, Y-
dc.creatorLiang, S-
dc.creatorXing, Z-
dc.creatorTan, SH-
dc.date.accessioned2025-07-15T08:44:12Z-
dc.date.available2025-07-15T08:44:12Z-
dc.identifier.isbn979-8-4007-0612-7-
dc.identifier.urihttp://hdl.handle.net/10397/114192-
dc.descriptionISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, Vienna Austria, September 16-20, 2024en_US
dc.language.isoenen_US
dc.publisherAssociation for Computing Machinery, Inc.en_US
dc.rights© 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, http://dx.doi.org/10.1145/3650212.3680398.en_US
dc.subjectBug detectionen_US
dc.subjectEmpirical studyen_US
dc.subjectSoftware testingen_US
dc.titleCharacterizing and detecting program representation faults of static analysis frameworksen_US
dc.typeConference Paperen_US
dc.identifier.spage1772-
dc.identifier.epage1784-
dc.identifier.doi10.1145/3650212.3680398-
dcterms.abstractStatic analysis frameworks (SAFs) such as Soot and WALA have been a fundamental support in today’s software analysis. They usually adopt various analysis techniques to transform programs into different representations which imply specific properties, e.g., call graph can demonstrate the calling relationships between methods in a program, and users rely on these program representations for further analysis like vulnerability detection and privacy leakage recognition. Hence, providing proper program representation is essential for SAFs. We conducted a systematic empirical study on program representation faults of static analysis frameworks. In our study, we first collect 141 issues from four popular SAFs and summarize their root causes, symptoms, and fix strategies, and reveal nine findings and some implications to avoid and detect program representation faults. Additionally, we implemented an automated testing framework named SAScope based on the metamorphic and differential testing motivated by findings and implications. Overall, SAScope can detect 19 program representation faults where 6 of them have been confirmed or fixed, demonstrating its effectiveness.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIn M Christakis, & M Pradel (Eds.), ISSTA ’24: Proceedings of the 33rd ACM SIGSOFT InternationalSymposium on Software Testing and Analysis, p. 1772-1784. New York, NY: Association for Computing Machinery, Inc., 2024-
dcterms.issued2024-
dc.identifier.scopus2-s2.0-85205553740-
dc.relation.conferenceInternational Symposium on Software Testing and Analysis [ISSTA]-
dc.description.validate202507 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumbera3888en_US
dc.identifier.SubFormID51563en_US
dc.description.fundingSourceSelf-fundeden_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
Zhang_Characterizing_Detecting_Program.pdfPre-Published version2.2 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.