Automatic software repair: A bibliography
M Monperrus - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
This article presents a survey on automatic software repair. Automatic software repair
consists of automatically finding a solution to software bugs without human intervention. This …
consists of automatically finding a solution to software bugs without human intervention. This …
Faults in Linux: Ten years later
In 2001, Chou et al. published a study of faults found by applying a static analyzer to Linux
versions 1.0 through 2.4. 1. A major result of their work was that the drivers directory …
versions 1.0 through 2.4. 1. A major result of their work was that the drivers directory …
Identifying linux bug fixing patches
In the evolution of an operating system there is a continuing tension between the need to
develop and test new features, and the need to provide a stable and secure execution …
develop and test new features, and the need to provide a stable and secure execution …
DTaint: detecting the taint-style vulnerability in embedded device firmware
K Cheng, Q Li, L Wang, Q Chen… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
A rising number of embedded devices are reachable in the cyberspace, such as routers,
cameras, printers, etc. Those devices usually run firmware whose code is proprietary with …
cameras, printers, etc. Those devices usually run firmware whose code is proprietary with …
Effective static analysis of concurrency {Use-After-Free} bugs in linux device drivers
In Linux device drivers, use-after-free (UAF) bugs can cause system crashes and serious
security problems. According to our study of Linux kernel commits, 42% of the driver commits …
security problems. According to our study of Linux kernel commits, 42% of the driver commits …
The care and feeding of wild-caught mutants
Mutation testing of a test suite and a program provides a way to measure the quality of the
test suite. In essence, mutation testing is a form of sensitivity testing: by running mutated …
test suite. In essence, mutation testing is a form of sensitivity testing: by running mutated …
Static detection of unsafe {DMA} accesses in device drivers
Direct Memory Access (DMA) is a popular mechanism for improving hardware I/O
performance, and it has been widely used by many existing device drivers. However, DMA …
performance, and it has been widely used by many existing device drivers. However, DMA …
Hector: Detecting resource-release omission faults in error-handling code for systems software
Omitting resource-release operations in systems error handling code can lead to memory
leaks, crashes, and deadlocks. Finding omission faults is challenging due to the difficulty of …
leaks, crashes, and deadlocks. Finding omission faults is challenging due to the difficulty of …
Negative results on mining crypto-api usage rules in android apps
Android app developers recurrently use crypto-APIs to provide data security to app users.
Unfortunately, misuse of APIs only creates an illusion of security and even exposes apps to …
Unfortunately, misuse of APIs only creates an illusion of security and even exposes apps to …
Goshawk: Hunting memory corruptions via structure-aware and object-centric memory operation synopsis
Existing tools for the automated detection of memory corruption bugs are not very effective in
practice. They typically recognize only standard memory management (MM) APIs (eg …
practice. They typically recognize only standard memory management (MM) APIs (eg …