All Stories

  1. Recover Function Signature from Combined Constraints
  2. Synchronized Behavior Checking: A Method for Finding Missed Compiler Optimizations
  3. SILVA: A Scalable Incremental Layered Sparse Value-Flow Analysis
  4. Posing New Challenges to Function Entry Identification Through Fine-Grained CFI Obfuscation
  5. Solving Floating-Point Constraints with Continuous Optimization
  6. Improving Test Efficacy for Large-Scale Android Applications by Exploiting GUI and Functional Equivalence
  7. Distance-Aware Test Input Selection for Deep Neural Networks
  8. Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations
  9. Evaluating the Effectiveness of Deep Learning Models for Foundational Program Analysis Tasks
  10. Finding Cross-Rule Optimization Bugs in Datalog Engines
  11. Comprehensive Semantic Repair of Obsolete GUI Test Scripts for Mobile Applications
  12. An Explanation Method for Models of Code
  13. OCFI: Make Function Entry Identification Hard Again
  14. Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering Datasets
  15. Graph Neural Network based Two-Phase Fault Localization Approach
  16. Detecting Defects in Deep Learning Systems: a Survey
  17. DeepLabel: Automated Issue Classification for Issue Tracking Systems
  18. JPortal: precise and efficient control-flow tracing for JVM programs with Intel processor trace
  19. Chianina: an evolving graph system for flow- and context-sensitive analyses of million lines of C code
  20. Learning semantic program embeddings with graph interval neural network
  21. Firmware Fuzzing: The State of the Art
  22. Accelerating Accuracy Improvement for Floating Point Programs via Memory Based Pruning
  23. Systemizing Interprocedural Static Analysis of Large-scale Systems Code with Graspan
  24. DangDone
  25. Detecting missing checks for identifying insufficient attack protections
  26. BovInspector: automatic inspection and repair of buffer overflow vulnerabilities
  27. Exploit imbalanced cell writes to mitigate write disturbance in dense phase change memory
  28. Selective restore
  29. Steering symbolic execution to less traveled paths
  30. Steering symbolic execution to less traveled paths