Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 33, Issue 2February 2024
Editor:
  • Mauro Pezzè
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1049-331X
EISSN:1557-7392
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Reflects downloads up to 23 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
DRIVE: Dockerfile Rule Mining and Violation Detection
Article No.: 30, Pages 1–23https://doi.org/10.1145/3617173

A Dockerfile defines a set of instructions to build Docker images, which can then be instantiated to support containerized applications. Recent studies have revealed a considerable amount of quality issues with Dockerfiles. In this article, we propose a ...

research-article
FQN Inference in Partial Code by Prompt-tuned Language Model of Code
Article No.: 31, Pages 1–32https://doi.org/10.1145/3617174

Partial code usually involves non-fully-qualified type names (non-FQNs) and undeclared receiving objects. Resolving the FQNs of these non-FQN types and undeclared receiving objects (referred to as type inference) is the prerequisite to effective search ...

research-article
Open Access
Probabilistic Safe WCET Estimation for Weakly Hard Real-time Systems at Design Stages
Article No.: 32, Pages 1–34https://doi.org/10.1145/3617176

Weakly hard real-time systems can, to some degree, tolerate deadline misses, but their schedulability still needs to be analyzed to ensure their quality of service. Such analysis usually occurs at early design stages to provide implementation guidelines ...

research-article
Open Access
Acrobats and Safety Nets: Problematizing Large-Scale Agile Software Development
Article No.: 33, Pages 1–45https://doi.org/10.1145/3617169

Agile development methods have become a standard in the software industry, including in large-scale projects. These methods share a set of underlying assumptions that distinguish them from more traditional plan-driven approaches. In this article, we adopt ...

research-article
A Closer Look at the Security Risks in the Rust Ecosystem
Article No.: 34, Pages 1–30https://doi.org/10.1145/3624738

Rust is an emerging programming language designed for the development of systems software. To facilitate the reuse of Rust code, crates.io, as a central package registry of the Rust ecosystem, hosts thousands of third-party Rust packages. The openness of ...

research-article
Open Access
Stress Testing Control Loops in Cyber-physical Systems
Article No.: 35, Pages 1–58https://doi.org/10.1145/3624742

Cyber-physical Systems (CPSs) are often safety-critical and deployed in uncertain environments. Identifying scenarios where CPSs do not comply with requirements is fundamental but difficult due to the multidisciplinary nature of CPSs. We investigate the ...

research-article
Understanding the Helpfulness of Stale Bot for Pull-Based Development: An Empirical Study of 20 Large Open-Source Projects
Article No.: 36, Pages 1–43https://doi.org/10.1145/3624739

Pull Requests (PRs) that are neither progressed nor resolved clutter the list of PRs, making it difficult for the maintainers to manage and prioritize unresolved PRs. To automatically track, follow up, and close such inactive PRs, Stale bot was introduced ...

research-article
Characterizing and Detecting WebAssembly Runtime Bugs
Article No.: 37, Pages 1–29https://doi.org/10.1145/3624743

WebAssembly (abbreviated WASM) has emerged as a promising language of the Web and also been used for a wide spectrum of software applications such as mobile applications and desktop applications. These applications, named WASM applications, commonly run ...

research-article
LoGenText-Plus: Improving Neural Machine Translation Based Logging Texts Generation with Syntactic Templates
Article No.: 38, Pages 1–45https://doi.org/10.1145/3624740

Developers insert logging statements in the source code to collect important runtime information about software systems. The textual descriptions in logging statements (i.e., logging texts) are printed during system executions and exposed to multiple ...

research-article
ALL: Supporting Experiential Accessibility Education and Inclusive Software Development
Article No.: 39, Pages 1–30https://doi.org/10.1145/3625292

Creating accessible software is imperative for making software inclusive for all users.Unfortunately, the topic of accessibility is frequently excluded from computing education, leading to scenarios where students are unaware of either how to develop ...

research-article
Search-Based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions
Article No.: 40, Pages 1–37https://doi.org/10.1145/3624745

Search-based software testing (SBST) typically relies on fitness functions to guide the search exploration toward software failures. There are two main techniques to define fitness functions: (a) automated fitness function computation from the ...

research-article
Variable-based Fault Localization via Enhanced Decision Tree
Article No.: 41, Pages 1–32https://doi.org/10.1145/3624741

Fault localization, aiming at localizing the root cause of the bug under repair, has been a longstanding research topic. Although many approaches have been proposed in past decades, most of the existing studies work at coarse-grained statement or method ...

research-article
Open Access
Hierarchical Distribution-aware Testing of Deep Learning
Article No.: 42, Pages 1–35https://doi.org/10.1145/3625290

With its growing use in safety/security-critical applications, Deep Learning (DL) has raised increasing concerns regarding its dependability. In particular, DL has a notorious problem of lacking robustness. Input added with adversarial perturbations, i.e.,...

research-article
Learning to Detect Memory-related Vulnerabilities
Article No.: 43, Pages 1–35https://doi.org/10.1145/3624744

Memory-related vulnerabilities can result in performance degradation or even program crashes, constituting severe threats to the security of modern software. Despite the promising results of deep learning (DL)-based vulnerability detectors, there exist ...

research-article
Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair
Article No.: 44, Pages 1–39https://doi.org/10.1145/3625293

To date, the users of test-driven program repair tools suffer from the overfitting problem; a generated patch may pass all available tests without being correct. In the existing work, users are treated as merely passive consumers of the tests. However, ...

research-article
Open Access
CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-aware Fuzzing
Article No.: 45, Pages 1–28https://doi.org/10.1145/3628160

Cryptography is a core component of many security applications, and flaws hidden in its implementation will affect the functional integrity or, more severely, pose threats to data security. Hence, guaranteeing the correctness of the implementation is ...

research-article
Automated Test Suite Generation for Software Product Lines Based on Quality-Diversity Optimization
Article No.: 46, Pages 1–52https://doi.org/10.1145/3628158

A Software Product Line (SPL) is a set of software products that are built from a variability model. Real-world SPLs typically involve a vast number of valid products, making it impossible to individually test each of them. This arises the need for ...

research-article
Automated Mapping of Adaptive App GUIs from Phones to TVs
Article No.: 47, Pages 1–31https://doi.org/10.1145/3631968

With the increasing interconnection of smart devices, users often desire to adopt the same app on quite different devices for identical tasks, such as watching the same movies on both their smartphones and TVs. However, the significant differences in ...

SECTION: Continuous Special Section: AI and SE
research-article
Open Access
KAPE: kNN-based Performance Testing for Deep Code Search
Article No.: 48, Pages 1–24https://doi.org/10.1145/3624735

Code search is a common yet important activity of software developers. An efficient code search model can largely facilitate the development process and improve the programming quality. Given the superb performance of learning the contextual ...

research-article
Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods
Article No.: 49, Pages 1–38https://doi.org/10.1145/3624734

Vulnerable third-party libraries pose significant threats to software applications that reuse these libraries. At an industry scale of reuse, manual analysis of third-party library vulnerabilities can be easily overwhelmed by the sheer number of ...

research-article
Public Access
Generation-based Differential Fuzzing for Deep Learning Libraries
Article No.: 50, Pages 1–28https://doi.org/10.1145/3628159

Deep learning (DL) libraries have become the key component in developing and deploying DL-based software nowadays. With the growing popularity of applying DL models in both academia and industry across various domains, any bugs inherent in the DL ...

research-article
The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks
Article No.: 51, Pages 1–24https://doi.org/10.1145/3630009

Machine learning (ML) has been increasingly used in a variety of domains, while solving ML programming tasks poses unique challenges due to the fundamental difference in the nature and the construct of general programming tasks, especially for developers ...

SECTION: Continuous Special Section: Security and SE
research-article
Open Access
LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries
Article No.: 52, Pages 1–35https://doi.org/10.1145/3625294

Third-party libraries (TPLs) are extensively utilized by developers to expedite the software development process and incorporate external functionalities. Nevertheless, insecure TPL reuse can lead to significant security risks. Existing methods, which ...

research-article
FormatFuzzer: Effective Fuzzing of Binary File Formats
Article No.: 53, Pages 1–29https://doi.org/10.1145/3628157

Effective fuzzing of programs that process structured binary inputs, such as multimedia files, is a challenging task, since those programs expect a very specific input format. Existing fuzzers, however, are mostly format-agnostic, which makes them ...

SECTION: Survey
survey
Survey of Code Search Based on Deep Learning
Article No.: 54, Pages 1–42https://doi.org/10.1145/3628161

Code writing is repetitive and predictable, inspiring us to develop various code intelligence techniques. This survey focuses on code search, that is, to retrieve code that matches a given natural language query by effectively capturing the semantic ...

survey
A Survey of Learning-based Automated Program Repair
Article No.: 55, Pages 1–69https://doi.org/10.1145/3631974

Automated program repair (APR) aims to fix software bugs automatically and plays a crucial role in software development and maintenance. With the recent advances in deep learning (DL), an increasing number of APR techniques have been proposed to leverage ...

Subjects

Comments