Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 33, Issue 1January 2024
Editor:
  • Mauro Pezzè
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1049-331X
EISSN:1557-7392
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Reflects downloads up to 06 Jan 2025Bibliometrics
Skip Table Of Content Section
editorial
Free
Editorial: Toward the Future with Eight Issues Per Year
Article No.: 1e, Pages 1–2https://doi.org/10.1145/3637444
research-article
Open Access
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge
Article No.: 1, Pages 1–40https://doi.org/10.1145/3604611

Widespread code reuse allows vulnerabilities to proliferate among a vast variety of firmware. There is an urgent need to detect these vulnerable codes effectively and efficiently. By measuring code similarities, AI-based binary code similarity detection ...

research-article
Open Access
Adonis: Practical and Efficient Control Flow Recovery through OS-level Traces
Article No.: 2, Pages 1–27https://doi.org/10.1145/3607187

Control flow recovery is critical to promise the software quality, especially for large-scale software in production environment. However, the efficiency of most current control flow recovery techniques is compromised due to their runtime overheads along ...

research-article
A First Look at Dark Mode in Real-world Android Apps
Article No.: 3, Pages 1–26https://doi.org/10.1145/3604607

Android apps often have a “dark mode” option used in low-light situations, for those who find the conventional color palette problematic, or because of personal preferences. Typically developers add a dark mode option for their apps with different ...

research-article
Programming by Example Made Easy
Article No.: 4, Pages 1–36https://doi.org/10.1145/3607185

Programming by example (PBE) is an emerging programming paradigm that automatically synthesizes programs specified by user-provided input-output examples. Despite the convenience for end-users, implementing PBE tools often requires strong expertise in ...

research-article
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects
Article No.: 5, Pages 1–37https://doi.org/10.1145/3607186

Modern software systems are designed to be deployed in different configured environments (e.g., permissions, virtual resources, network connections) and adapted at runtime to different situations (e.g., memory limits, enabling/disabling features, database ...

research-article
API Entity and Relation Joint Extraction from Text via Dynamic Prompt-tuned Language Model
Article No.: 6, Pages 1–25https://doi.org/10.1145/3607188

Extraction of Application Programming Interfaces (APIs) and their semantic relations from unstructured text (e.g., Stack Overflow) is a fundamental work for software engineering tasks (e.g., API recommendation). However, existing approaches are rule based ...

research-article
Open Access
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees
Article No.: 7, Pages 1–36https://doi.org/10.1145/3611663

A Software Product Line (SPL) is a family of similar programs. Each program is defined by a unique set of features, called a configuration, that satisfies all feature constraints. “What configuration achieves the best performance for a given workload?” is ...

research-article
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs
Article No.: 8, Pages 1–21https://doi.org/10.1145/3607182

Concurrent programs are normally composed of multiple concurrent threads sharing memory space. These threads are often interleaved, which may lead to some non-determinism in execution results, even for the same program input. This poses huge challenges to ...

research-article
Open Access
Framework for SQL Error Message Design: A Data-Driven Approach
Article No.: 9, Pages 1–50https://doi.org/10.1145/3607180

Software developers use a significant amount of time reading and interpreting error messages. However, error messages have often been based on either anecdotal evidence or expert opinion, disregarding novices, who arguably are the ones who benefit the ...

research-article
Testing Causality in Scientific Modelling Software
Article No.: 10, Pages 1–42https://doi.org/10.1145/3607184

From simulating galaxy formation to viral transmission in a pandemic, scientific models play a pivotal role in developing scientific theories and supporting government policy decisions that affect us all. Given these critical applications, a poor ...

research-article
Open Access
Horus: Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures
Article No.: 11, Pages 1–25https://doi.org/10.1145/3611665

Kernel fuzzing is an effective technique in operating system vulnerability detection. Fuzzers such as Syzkaller and Moonshine frequently pass highly structured data between fuzzer processes in guest virtual machines and manager processes in the host ...

research-article
Open Access
Automated and Efficient Test-Generation for Grid-Based Multiagent Systems: Comparing Random Input Filtering versus Constraint Solving
Article No.: 12, Pages 1–32https://doi.org/10.1145/3624736

Automatic generation of random test inputs is an approach that can alleviate the challenges of manual test case design. However, random test cases may be ineffective in fault detection and increase testing cost, especially in systems where test execution ...

research-article
Towards Causal Analysis of Empirical Software Engineering Data: The Impact of Programming Languages on Coding Competitions
Article No.: 13, Pages 1–35https://doi.org/10.1145/3611667

There is abundant observational data in the software engineering domain, whereas running large-scale controlled experiments is often practically impossible. Thus, most empirical studies can only report statistical correlations—instead of potentially more ...

research-article
The Human Side of Fuzzing: Challenges Faced by Developers during Fuzzing Activities
Article No.: 14, Pages 1–26https://doi.org/10.1145/3611668

Fuzz testing, also known as fuzzing, is a software testing technique aimed at identifying software vulnerabilities. In recent decades, fuzzing has gained increasing popularity in the research community. However, existing studies led by fuzzing experts ...

research-article
Automatically Detecting Incompatible Android APIs
Article No.: 15, Pages 1–33https://doi.org/10.1145/3624737

Fragmentation is a serious problem in the Android ecosystem, which is mainly caused by the fast evolution of the system itself and the various system customizations. Many efforts have attempted to mitigate its impact via approaches to automatically ...

research-article
StubCoder: Automated Generation and Repair of Stub Code for Mock Objects
Article No.: 16, Pages 1–31https://doi.org/10.1145/3617171

Mocking is an essential unit testing technique for isolating the class under test from its dependencies. Developers often leverage mocking frameworks to develop stub code that specifies the behaviors of mock objects. However, developing and maintaining ...

research-article
On the Caching Schemes to Speed Up Program Reduction
Article No.: 17, Pages 1–30https://doi.org/10.1145/3617172

Program reduction is a highly practical, widely demanded technique to help debug language tools, such as compilers, interpreters and debuggers. Given a program P that exhibits a property ψ, conceptually, program reduction iteratively applies various ...

research-article
Open Access
Testing Abstractions for Cyber-Physical Control Systems
Article No.: 18, Pages 1–32https://doi.org/10.1145/3617170

Control systems are ubiquitous and often at the core of Cyber-Physical Systems, like cars and aeroplanes. They are implemented as embedded software that interacts in closed loop with the physical world through sensors and actuators. As a consequence, the ...

research-article
Open Access
Differentiable Quantum Programming with Unbounded Loops
Article No.: 19, Pages 1–63https://doi.org/10.1145/3617178

The emergence of variational quantum applications has led to the development of automatic differentiation techniques in quantum computing. Existing work has formulated differentiable quantum programming with bounded loops, providing a framework for ...

SECTION: Continuous Special Section: AI and SE
research-article
TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site
Article No.: 20, Pages 1–25https://doi.org/10.1145/3607189

Technical Q&A sites, such as Stack Overflow and Ask Ubuntu, have been widely utilized by software engineers to seek support for development challenges. However, not all the raised questions get instant feedback, and the retrieved answers can vary in ...

research-article
Open Access
Faire: Repairing Fairness of Neural Networks via Neuron Condition Synthesis
Article No.: 21, Pages 1–24https://doi.org/10.1145/3617168

Deep Neural Networks (DNNs) have achieved tremendous success in many applications, while it has been demonstrated that DNNs can exhibit some undesirable behaviors on concerns such as robustness, privacy, and other trustworthiness issues. Among them, ...

research-article
Open Access
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks
Article No.: 22, Pages 1–40https://doi.org/10.1145/3607191

Graph Neural Networks (GNNs) have achieved promising performance in a variety of practical applications. Similar to traditional DNNs, GNNs could exhibit incorrect behavior that may lead to severe consequences, and thus testing is necessary and crucial. ...

research-article
Seed Selection for Testing Deep Neural Networks
Article No.: 23, Pages 1–33https://doi.org/10.1145/3607190

Deep learning (DL) has been applied in many applications. Meanwhile, the quality of DL systems is becoming a big concern. To evaluate the quality of DL systems, a number of DL testing techniques have been proposed. To generate test cases, a set of initial ...

research-article
Snippet Comment Generation Based on Code Context Expansion
Article No.: 24, Pages 1–30https://doi.org/10.1145/3611664

Code commenting plays an important role in program comprehension. Automatic comment generation helps improve software maintenance efficiency. The code comments to annotate a method mainly include header comments and snippet comments. The header comment ...

research-article
Open Access
LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing
Article No.: 25, Pages 1–28https://doi.org/10.1145/3611666

Applying deep learning (DL) to science is a new trend in recent years, which leads DL engineering to become an important problem. Although training data preparation, model architecture design, and model training are the normal processes to build DL models,...

SECTION: Continuous Special Section: Security and SE
research-article
A First Look at On-device Models in iOS Apps
Article No.: 26, Pages 1–30https://doi.org/10.1145/3617177

Powered by the rising popularity of deep learning techniques on smartphones, on-device deep learning models are being used in vital fields such as finance, social media, and driving assistance. Because of the transparency of the Android platform and the ...

SECTION: Survey
survey
Open Access
Testing RESTful APIs: A Survey
Article No.: 27, Pages 1–41https://doi.org/10.1145/3617175

In industry, RESTful APIs are widely used to build modern Cloud Applications. Testing them is challenging, because not only do they rely on network communications, but also they deal with external services like databases. Therefore, there has been a large ...

SECTION: Registered Papers
research-article
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks
Article No.: 28, Pages 1–29https://doi.org/10.1145/3617593

Recent decades have seen the rise of large-scale Deep Neural Networks (DNNs) to achieve human-competitive performance in a variety of AI tasks. Often consisting of hundreds of million, if not hundreds of billion, parameters, these DNNs are too large to be ...

SECTION: RCR Reports
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report
Article No.: 29, Pages 1–4https://doi.org/10.1145/3617594

This is the Replicated Computational Results (RCR) Report for our TOSEM paper “Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks”, where we propose a novel client-server architecture allowing to leverage the high ...

Subjects

Comments