Fri 22 Jul 2022 08:00 - 08:20 at ISSTA 2 - Session 2-14: Program Repair B Chair(s): Christoph Csallner
Program vulnerabilities, even when detected and reported, are not fixed immediately. The time lag between the reporting and fixing of a vulnerability causes open-source software systems to suffer from significant exposure to possible attacks. In this paper, we propose a counter-example guided inductive inference procedure over program states to define likely invariants at possible fix locations. The likely invariants present a generalization of observed states as well as potentially infeasible states obtained by mutating the observed states. Once such likely invariants, which we call patch invariants, are identified, we can use them to construct patches via simple patch templates. Our work assumes that only one failing input (representing the exploit) is available to start the repair process. Experiments on the VulnLoc data-set of vulnerabilities, which has been curated in previous works on vulnerability repair, show the effectiveness of our repair procedure. As compared to proposed approaches for vulnerability repair such as CPR or SenX which are based on concolic and symbolic execution respectively, we can repair significantly more vulnerabilities. Moreover our mutation procedure over states turns out to be more effective for inductive property inference, as compared to the usual greybox fuzzing over program inputs. Our results show the potential for program repair via inductive constraint inference, as opposed to generating repair constraints via deductive/symbolic analysis of a given test-suite.
Thu 21 JulDisplayed time zone: Seoul change
18:00 - 18:40 | |||
18:00 20mTalk | CIRCLE: Continual Repair across Programming Languages Technical Papers Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland DOI | ||
18:20 20mTalk | Program Vulnerability Repair via Inductive Inference Technical Papers Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore DOI |
Fri 22 JulDisplayed time zone: Seoul change
07:00 - 08:20 | Session 2-14: Program Repair BTechnical Papers at ISSTA 2 Chair(s): Christoph Csallner University of Texas at Arlington | ||
07:00 20mTalk | ATR: Template-based Repair for Alloy Specifications Technical Papers Guolong Zheng University of Nebraska Lincoln, ThanhVu Nguyen George Mason University, Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Hamid Bagheri University of Nebraska-Lincoln DOI | ||
07:20 20mTalk | CIRCLE: Continual Repair across Programming Languages Technical Papers Wei Yuan The University of Queensland, Quanjun Zhang Nanjing University, Tieke He Nanjing University, Chunrong Fang Nanjing University, Nguyen Quoc Viet Hung Griffith University, Xiaodong Hao Nanjing University, Hongzhi Yin The University of Queensland DOI | ||
07:40 20mTalk | Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code Technical Papers DOI Pre-print | ||
08:00 20mTalk | Program Vulnerability Repair via Inductive Inference Technical Papers Yuntong Zhang National University of Singapore, Xiang Gao Beihang University, China, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore DOI |