Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact
Sat 17 Jul 2021 08:00 - 08:20 at ISSTA 1 - Session 25 (time band 3) Testing and Analysis Chair(s): Michael Pradel
Whenever a bug or vulnerability is detected in the Linux kernel, the kernel developers will endeavour to fix it by introducing a patch into the mainline version of the Linux kernel source tree. However, many users run older “stable” versions of Linux, meaning that the patch should also be “backported” to one or more of these older kernel versions. This process is error-prone and there is usually along delay in publishing the backported patch. Based on an empirical study, we show that around 8% of all commits submitted to Linux mainline are backported to older versions,but often more than one month elapses before the backport is available. Hence, we propose a patch backporting technique that can automatically transfer patches from the mainline version of Linux into older stable versions. Our approach first synthesizes a partial transformation rule based on a Linux mainline patch. This rule can then be generalized by analysing the alignment between the mainline and target versions. The generalized rule is then applied to the target version to produce a backported patch. We have implemented our transformation technique in a tool called FixMorph and evaluated it on 350 Linux mainline patches. FixMorph correctly backports 75.1% of them. Compared to existing techniques, FixMorph improves both the precision and recall in backporting patches. Apart from automation of software maintenance tasks, patch backporting helps in reducing the exposure to known security vulnerabilities in stable versions of the Linux kernel.
Fri 16 JulDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
18:20 - 20:00 | Session 20 (time band 1) AnalysisTechnical Papers at ISSTA 2 Chair(s): Shiyi Wei University of Texas at Dallas | ||
18:20 20mTalk | A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped BinariesACM SIGSOFT Distinguished Paper Technical Papers Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Weiming Zhang University of Science and Technology of China DOI | ||
18:40 20mTalk | Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper) Technical Papers Sicheng Luo Fudan University, Hui Xu Fudan University, Yanxiang Bi Fudan University, Xin Wang Fudan University, Yangfan Zhou Fudan University DOI File Attached | ||
19:00 20mTalk | Finding Data Compatibility Bugs with JSON Subschema CheckingDistinguished Artifact Technical Papers Andrew Habib SnT, University of Luxembourg, Avraham Shinnar IBM Research, Martin Hirzel IBM Research, Michael Pradel University of Stuttgart Link to publication DOI Pre-print File Attached | ||
19:20 20mTalk | SAND: A Static Analysis Approach for Detecting SQL AntipatternsACM SIGSOFT Distinguished Paper Technical Papers Yingjun Lyu Amazon, Sasha Volokh University of Southern California, William G.J. Halfond University of Southern California, Omer Tripp Amazon DOI | ||
19:40 20mTalk | Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact Technical Papers Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao National University of Singapore, Gregory J. Duck National University of Singapore, Shin Hwei Tan Southern University of Science and Technology, Julia Lawall Inria, Abhik Roychoudhury National University of Singapore DOI Pre-print Media Attached |
Sat 17 JulDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
08:00 - 09:20 | Session 25 (time band 3) Testing and AnalysisTechnical Papers at ISSTA 1 Chair(s): Michael Pradel University of Stuttgart | ||
08:00 20mTalk | Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact Technical Papers Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao National University of Singapore, Gregory J. Duck National University of Singapore, Shin Hwei Tan Southern University of Science and Technology, Julia Lawall Inria, Abhik Roychoudhury National University of Singapore DOI Pre-print Media Attached | ||
08:20 20mTalk | Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms Technical Papers Kulani Tharaka Mahadewa National University of Singapore, Yanjun Zhang University of Queensland, Guangdong Bai University of Queensland, Lei Bu Nanjing University, Zhiqiang Zuo Nanjing University, Dileepa Fernando Sri Lanka Technological Campus, Zhenkai Liang National University of Singapore, Jin Song Dong National University of Singapore DOI Media Attached File Attached | ||
08:40 20mTalk | Modular Call Graph Construction for Security Scanning of Node.js Applications Technical Papers Benjamin Barslev Nielsen Aarhus University, Martin Toldam Torp Aarhus University, Anders Møller Aarhus University DOI Media Attached | ||
09:00 20mTalk | Semantic Matching of GUI Events for Test Reuse: Are We There Yet? Technical Papers Leonardo Mariani University of Milano-Bicocca, Ali Mohebbi USI Lugano, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology, Valerio Terragni University of Auckland DOI Pre-print |