Automatic software repair: A bibliography

M Monperrus - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
This article presents a survey on automatic software repair. Automatic software repair
consists of automatically finding a solution to software bugs without human intervention. This …

Faults in Linux: Ten years later

N Palix, G Thomas, S Saha, C Calvès, J Lawall… - Proceedings of the …, 2011 - dl.acm.org
In 2001, Chou et al. published a study of faults found by applying a static analyzer to Linux
versions 1.0 through 2.4. 1. A major result of their work was that the drivers directory …

Identifying linux bug fixing patches

Y Tian, J Lawall, D Lo - 2012 34th international conference on …, 2012 - ieeexplore.ieee.org
In the evolution of an operating system there is a continuing tension between the need to
develop and test new features, and the need to provide a stable and secure execution …

DTaint: detecting the taint-style vulnerability in embedded device firmware

K Cheng, Q Li, L Wang, Q Chen… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
A rising number of embedded devices are reachable in the cyberspace, such as routers,
cameras, printers, etc. Those devices usually run firmware whose code is proprietary with …

Effective static analysis of concurrency {Use-After-Free} bugs in linux device drivers

JJ Bai, J Lawall, QL Chen, SM Hu - 2019 USENIX Annual Technical …, 2019 - usenix.org
In Linux device drivers, use-after-free (UAF) bugs can cause system crashes and serious
security problems. According to our study of Linux kernel commits, 42% of the driver commits …

The care and feeding of wild-caught mutants

DB Brown, M Vaughn, B Liblit, T Reps - … of the 2017 11th Joint Meeting …, 2017 - dl.acm.org
Mutation testing of a test suite and a program provides a way to measure the quality of the
test suite. In essence, mutation testing is a form of sensitivity testing: by running mutated …

Static detection of unsafe {DMA} accesses in device drivers

JJ Bai, T Li, K Lu, SM Hu - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Direct Memory Access (DMA) is a popular mechanism for improving hardware I/O
performance, and it has been widely used by many existing device drivers. However, DMA …

Hector: Detecting resource-release omission faults in error-handling code for systems software

S Saha, JP Lozi, G Thomas, JL Lawall… - 2013 43rd Annual …, 2013 - ieeexplore.ieee.org
Omitting resource-release operations in systems error handling code can lead to memory
leaks, crashes, and deadlocks. Finding omission faults is challenging due to the difficulty of …

Negative results on mining crypto-api usage rules in android apps

J Gao, P Kong, L Li, TF Bissyandé… - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
Android app developers recurrently use crypto-APIs to provide data security to app users.
Unfortunately, misuse of APIs only creates an illusion of security and even exposes apps to …

Goshawk: Hunting memory corruptions via structure-aware and object-centric memory operation synopsis

Y Lyu, Y Fang, Y Zhang, Q Sun, S Ma… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Existing tools for the automated detection of memory corruption bugs are not very effective in
practice. They typically recognize only standard memory management (MM) APIs (eg …