Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterDecember 2024
Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications?
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4928–4930https://doi.org/10.1145/3658644.3691419Server-side request forgeries (SSRFs) are inevitable in PHP web applications. Existing static taint analysis tools for PHP suffer from both high rates of false positives and false negatives in detecting SSRF because they do not incorporate application-...
- research-articleApril 2024
No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 6Pages 1548–1584https://doi.org/10.1109/TSE.2024.3392499Large language models (LLMs) have demonstrated impressive capabilities across various natural language processing (NLP) tasks, such as machine translation, question answering, summarization, and so on. Additionally, LLMs are also highly valuable in ...
- research-articleMarch 2024
ChatGPT vs SBST: A Comparative Assessment of Unit Test Suite Generation
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 6Pages 1340–1359https://doi.org/10.1109/TSE.2024.3382365Recent advancements in large language models (LLMs) have demonstrated exceptional success in a wide range of general domain tasks, such as question answering and following instructions. Moreover, LLMs have shown potential in various software engineering ...
- research-articleFebruary 2024
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 4Pages 854–883https://doi.org/10.1109/TSE.2024.3366613Unit testing is critical to the software development process, ensuring the correctness of basic programming units in a program (e.g., a method). Search-based software testing (SBST) is an automated approach to generating test cases. SBST generates test ...
- erratumJanuary 2024
Corrections to “Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving”
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 1Page 158https://doi.org/10.1109/TSE.2023.3339345In [1, p. 4967], a figure citation is incorrect and “Fig. 3(c)” should be “Fig. 1(c)” in the left column, the fourth line from the bottom. It is corrected below.
-
- research-articleSeptember 2024
Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components
ASE '23: Proceedings of the 38th IEEE/ACM International Conference on Automated Software EngineeringPages 1212–1224https://doi.org/10.1109/ASE56229.2023.00074Existing Android malware detection systems primarily concentrate on detecting malware apps, leaving a gap in the research concerning the detection of malicious components in apps. In this work, we propose a novel approach to detect fine-granularity ...
- research-articleOctober 2023
Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 11Pages 4964–4987https://doi.org/10.1109/TSE.2023.3321381Code coverage has been widely used as the basis for various software quality assurance techniques. Therefore, it is of great importance to ensure that coverage profilers provide reliable code coverage. However, it is challenging to validate the ...
- research-articleApril 2023
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 4Pages 1464–1486https://doi.org/10.1109/TSE.2022.3178096Removing all function errors is critical for making successful mobile apps. Since app testing may miss some function errors given limited time and resource, the user reviews of mobile apps are very important to developers for learning the uncaught errors. ...
- research-articleJanuary 2023
Cheating your apps: Black‐box adversarial attacks on deep learning apps
Journal of Software: Evolution and Process (WSMR), Volume 36, Issue 4https://doi.org/10.1002/smr.2528AbstractDeep learning is a powerful technique to boost application performance in various fields, including face recognition, image classification, natural language understanding, and recommendation system. With the rapid increase in the computing power ...
In this paper, we propose an effective black‐box approach by training substitute models to spoof the deep learning systems inside the apps. We evaluate our approach on 10 real‐world deep‐learning apps from Google Play to perform black‐box adversarial ...
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test Generation
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 91, Pages 1–12https://doi.org/10.1145/3551349.3556902Unit testing is a critical part of software development process, ensuring the correctness of basic programming units in a program (e.g., a method). Search-based software testing (SBST) is an automated approach to generating test cases. SBST generates ...
- research-articleAugust 2022
A Systematical Study on Application Performance Management Libraries for Apps
IEEE Transactions on Software Engineering (ISOF), Volume 48, Issue 8Pages 3044–3065https://doi.org/10.1109/TSE.2021.3077654Being able to automatically detect the performance issues in apps can significantly improve apps’ quality as well as having a positive influence on user satisfaction. <underline>A</underline>pplication <underline>P</underline>erformance <underline>...
- research-articleApril 2022
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit
- Guosheng Xu,
- Siyi Li,
- Hao Zhou,
- Shucen Liu,
- Yutian Tang,
- Li Li,
- Xiapu Luo,
- Xusheng Xiao,
- Guoai Xu,
- Haoyu Wang
WWW '22: Proceedings of the ACM Web Conference 2022Pages 3327–3335https://doi.org/10.1145/3485447.3512151Online content sharing is a widely used feature in Android apps. In this paper, we observe a new Fake-Share attack that adversaries can abuse existing content sharing services to manipulate the displayed source of shared content to bypass the content ...
- research-articleNovember 2021
AComNN: Attention enhanced Compound Neural Network for financial time-series forecasting with cross-regional features
AbstractIn recent years, many works spring out to adopt the forecast-based approach to support the investment decision in the financial market. Nevertheless, most of them do not consider mining the hidden patterns in the cross-regional ...
Highlights- Present a method for learning the hidden patterns of the financial time-series.
- research-articleApril 2021
Just-in-time defect prediction for Android apps via imbalanced deep learning model
SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied ComputingPages 1447–1454https://doi.org/10.1145/3412841.3442019Android mobile apps have played important roles in our daily life and work. To meet new requirements from users, the mobile apps encounter frequent updates, which involves in a large quantity of code commits. Previous studies proposed to apply Just-in-...
- research-articleJanuary 2021
Object-Level Remote Sensing Image Augmentation Using U-Net-Based Generative Adversarial Networks
With the continuous development of deep learning in computer vision, semantic segmentation technology is constantly employed for processing remote sensing images. For instance, it is a key technology to automatically mark important objects such as ships ...
- research-articleJanuary 2021
Demystifying diehard Android apps
ASE '20: Proceedings of the 35th IEEE/ACM International Conference on Automated Software EngineeringPages 187–198https://doi.org/10.1145/3324884.3416637Smartphone vendors are using multiple methods to kill processes of Android apps to reduce the battery consumption. This motivates developers to find ways to extend the liveness time of their apps, hence the name diehard apps in this paper. Although ...
- research-articleNovember 2020
All your app links are belong to us: understanding the threats of instant apps based attacks
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 914–926https://doi.org/10.1145/3368089.3409702Android deep link is a URL that takes users to a specific page of a mobile app, enabling seamless user experience from a webpage to an app. Android app link, a new type of deep link introduced in Android 6.0, is claimed to offer more benefits, such as ...
- research-articleDecember 2019
LDFR: Learning deep feature representation for software defect prediction
Journal of Systems and Software (JSSO), Volume 158, Issue Chttps://doi.org/10.1016/j.jss.2019.110402Highlights- Proposing a novel framework to learn deep feature representation for software defect data
- Utilizing a deep neural network with a new hybrid loss function
- Conducting experiments on 27 project versions and achieving encourage ...
Software Defect Prediction (SDP) aims to detect defective modules to enable the reasonable allocation of testing resources, which is an economically critical activity in software quality assurance. Learning effective feature representation and ...
- research-articleFebruary 2020
Demystifying application performance management libraries for Android
ASE '19: Proceedings of the 34th IEEE/ACM International Conference on Automated Software EngineeringPages 682–685https://doi.org/10.1109/ASE.2019.00069Since the performance issues of apps can influence users' experience, developers leverage application performance management (APM) tools to locate the potential performance bottleneck of their apps. Unfortunately, most developers do not understand how ...
- research-articleSeptember 2019
Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning
Journal of Computer Science and Technology (JCST), Volume 34, Issue 5Pages 1039–1062https://doi.org/10.1007/s11390-019-1959-zAbstractDefect prediction assists the rational allocation of testing resources by detecting the potentially defective software modules before releasing products. When a project has no historical labeled defect data, cross project defect prediction (CPDP) ...