ICSE 2024
Fri 12 - Sun 21 April 2024 Lisbon, Portugal
Wed 17 Apr 2024 14:00 - 14:15 at Grande Auditório - Security 1 Chair(s): Letizia Jaccheri

Concolic execution is a powerful program analysis technique for code path exploration. Despite the recent advances that greatly improved the efficiency of concolic execution engines, path constraint solving remains a major bottleneck of concolic testing. An intelligent scheduler for inputs/branches becomes even more crucial. Our studies show that the previously under-studied branch-flipping policy adopted by state-of-the-art concolic execution engines has several limitations. We propose to assess each branch by its potential for new code coverage from a global view, concerning the path divergence probability at each branch. To validate this idea, we implemented a prototype Marco and evaluated it against the state-of-the-art concolic executor on 30 real-world programs from Google’s Fuzzbench, Binutils, and UniBench. The result shows that Marco can outperform the baseline approach and make continuous progress after the baseline approach terminates.

Wed 17 Apr

Displayed time zone: Lisbon change

14:00 - 15:30
Security 1Research Track / Journal-first Papers at Grande Auditório
Chair(s): Letizia Jaccheri Norwegian University of Science and Technology (NTNU)
14:00
15m
Talk
Marco: A Stochastic Asynchronous Concolic Explorer
Research Track
Jie Hu University of California Riverside, Yue Duan Singapore Management University, Heng Yin UC Riverside
Pre-print
14:15
15m
Talk
Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Research Track
Stefanos Chaliasos Imperial College London, Marcos Antonios Charalambous Imperial College London, Liyi Zhou Imperial College London, Rafaila Galanopoulou University of Athens, Arthur Gervais Imperial College London, Dimitris Mitropoulos University of Athens, Ben Livshits Imperial College London
14:30
15m
Talk
DocFlow: Extracting Taint Specifications from Software Documentation
Research Track
Marcos Tileria Royal Holloway, University of London, Jorge Blasco Universidad Politécnica de Madrid, Santanu Dash University of Surrey
14:45
15m
Talk
Toward Improved Deep Learning-based Vulnerability Detection
Research Track
Adriana Sejfia University of Edinburgh, Satyaki Das University of Southern California, Saad Shafiq University of Southern California, Nenad Medvidović University of Southern California
Pre-print
15:00
15m
Talk
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android AppsACM SIGSOFT Distinguished Paper Award
Research Track
Yongliang Chen City University of Hong Kong, Ruoqin Tang City University of Hong Kong, Chaoshun Zuo Ohio State University, Xiaokuan Zhang George Mason University, Lei Xue Sun Yat-Sen University, Xiapu Luo The Hong Kong Polytechnic University, Qingchuan Zhao City University of Hong Kong
15:15
7m
Talk
Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study
Journal-first Papers
Monika di Angelo TU Wien, Thomas Durieux TU Delft, João F. Ferreira INESC-ID and IST, University of Lisbon, Gernot Salzer TU Wien
Link to publication DOI Pre-print File Attached