Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/114192
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Zhang, H | - |
dc.creator | Pei, Y | - |
dc.creator | Liang, S | - |
dc.creator | Xing, Z | - |
dc.creator | Tan, SH | - |
dc.date.accessioned | 2025-07-15T08:44:12Z | - |
dc.date.available | 2025-07-15T08:44:12Z | - |
dc.identifier.isbn | 979-8-4007-0612-7 | - |
dc.identifier.uri | http://hdl.handle.net/10397/114192 | - |
dc.description | ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, Vienna Austria, September 16-20, 2024 | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery, Inc. | en_US |
dc.rights | © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, http://dx.doi.org/10.1145/3650212.3680398. | en_US |
dc.subject | Bug detection | en_US |
dc.subject | Empirical study | en_US |
dc.subject | Software testing | en_US |
dc.title | Characterizing and detecting program representation faults of static analysis frameworks | en_US |
dc.type | Conference Paper | en_US |
dc.identifier.spage | 1772 | - |
dc.identifier.epage | 1784 | - |
dc.identifier.doi | 10.1145/3650212.3680398 | - |
dcterms.abstract | Static analysis frameworks (SAFs) such as Soot and WALA have been a fundamental support in today’s software analysis. They usually adopt various analysis techniques to transform programs into different representations which imply specific properties, e.g., call graph can demonstrate the calling relationships between methods in a program, and users rely on these program representations for further analysis like vulnerability detection and privacy leakage recognition. Hence, providing proper program representation is essential for SAFs. We conducted a systematic empirical study on program representation faults of static analysis frameworks. In our study, we first collect 141 issues from four popular SAFs and summarize their root causes, symptoms, and fix strategies, and reveal nine findings and some implications to avoid and detect program representation faults. Additionally, we implemented an automated testing framework named SAScope based on the metamorphic and differential testing motivated by findings and implications. Overall, SAScope can detect 19 program representation faults where 6 of them have been confirmed or fixed, demonstrating its effectiveness. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | In M Christakis, & M Pradel (Eds.), ISSTA ’24: Proceedings of the 33rd ACM SIGSOFT InternationalSymposium on Software Testing and Analysis, p. 1772-1784. New York, NY: Association for Computing Machinery, Inc., 2024 | - |
dcterms.issued | 2024 | - |
dc.identifier.scopus | 2-s2.0-85205553740 | - |
dc.relation.conference | International Symposium on Software Testing and Analysis [ISSTA] | - |
dc.description.validate | 202507 bcch | - |
dc.description.oa | Accepted Manuscript | en_US |
dc.identifier.FolderNumber | a3888 | en_US |
dc.identifier.SubFormID | 51563 | en_US |
dc.description.fundingSource | Self-funded | en_US |
dc.description.pubStatus | Published | en_US |
dc.description.oaCategory | Green (AAM) | en_US |
Appears in Collections: | Conference Paper |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Zhang_Characterizing_Detecting_Program.pdf | Pre-Published version | 2.2 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.