Schedule

Venue

If there are papers listed for a given day, you should read them before class that day. For student presented papers, on any week that you are not presenting a paper, you should write a response/critique to one of that week's papers. These critiques don't just show that you have at least skimmed through the paper, but they prepare you to discuss the papers and raise (or answer) questions during class. Critiques must be submitted via CourSys by 10:00PM before (PDFs, please). If you are presenting a paper, slides for presentation must be submitted via CourSys by 10:00PM before the class (PDFs, please).

The schedule is subject to change.

Week Date Topics Papers
1 Jan 5 Introduction
Representations
Slicing
Project 1 due Jan 19
Jan 7 LLVM
LLVM Demo
2 Jan 12 Static Analysis Thomas Reps, Susan Horwitz, Mooly Sagiv
Precise Interprocedural Dataflow Analysis via Graph Reachability
POPL 1995
Jan 14 Static Analysis
FilePolicy.cpp
FilePolicy.h
Thomas Ball, James Larus
Efficient Path Profiling
MICRO 1996
3 Jan 19 Dynamic Analysis
Testing &
Symbolic Execution
Koushik Sen, Christian Cadar
Symbolic Execution for Software Testing: Three Decades Later
CACM, February 2013
Jan 21 Test Reduction Nick Andreas Zeller, Ralf Hildebrandt
Simplifying and isolating failure-inducing input.
TSE 2002
Commentary
4 Jan 26 Geoff
Rafiq
Sanjeet
Xuejun Yang, Yang Chen, Eric Eide, John Regehr
Finding and Understanding bugs in C compilers
PLDI 2011
Jan 28 Vivek
Rafael
Suraiya
Carlos Pacheco, Shuvendu K. Lahiri, Michael D. Ernst, Thomas Ball
Feedback-directed random test generation
ICSE 2007
5 Feb 2 Shan
Dongyuan
Jitin
Koushik Sen, George Necula, Liang Gong, Wontae Choi
MultiSE: multi-path symbolic execution using value summaries
FSE 2015
Feb 4 Tristan
Tyler
Patrice Godefroid, Michael Y. Levin, David Molnar
Automated Whitebox Fuzz Testing
NDSS 2008
6 Feb 9 READING WEEK
Feb 11 READING WEEK
7 Feb 16 Golnaz
Wen
Michael Eichberg, Ben Hermann, Mira Mezini, Leonid Glanz
Hidden Truths in Dead Software Paths
FSE 2015
Feb 18 Connor
Ye
Steven
Tien-Duy B. Le, Richard J. Oentaryo, David Lo
Information Retrieval and Spectrum Based Bug Localization: Better Together
FSE 2015
8 Feb 23 Nick Nicolas Carlini, Antonio Barresi, Mathias Payer, David Wagner, Thomas R. Gross
Control-Flow Bending: On the Effectiveness of Control-Flow Integrity
USENIX Security 2015
Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song
Eternal War in Memory (Section 2)
Security and Privacy (Oakland) 2013
Feb 25 Everyone Lightning Talks
9 Mar 1 Jitin
Viv
Seokhyeon Moon, Yunho Kim, Moonzoo Kim, Shin Yoo
Ask the Mutants: Mutating Faulty Programs for Fault Localization
ICST 2014
Mar 3 Wen
Golnaz
Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code
OSDI 2004
10 Mar 8 Dongyuan
Svenja
Guoliang Jin, Linhai Song, Xiaoming Shi, Joel Scherpelz, Shan Lu
Understanding and Detecting Real-World Performance Bugs
PLDI 2012
Mar 10 Rafiq
Sanjeet
Michael I. Gordon, Jeff Perkins, Limei Gilham, Nguyen Nguyen, Martin Rinard
Information Flow Analysis of Android Applications in DroidSafe
NDSS 2015
11 Mar 15 No Class
Mar 17 Tyler Samuel Jero, Hyojeong Lee, Cristina Nita-Rotaru
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
DSN 2015
12 Mar 22 Steven
Ye
Mingxing Zhang, Yongwei Wu, Shan Lu, Shanxiang Qi, Jinglei Ren, Weimin Zheng
AI: A Lightweight System for Tolerating Concurrency Bugs
FSE 2014
Mar 24 Connor
Geoff
Abhijeet Banerjee, Lee Kee Chong, Sudipta Chattopadhyay, Abhik Roychoudhury
Detecting Energy Bugs and Hotspots in Mobile Apps
FSE 2014
13 Mar 29 Projects
Mar 31 Rafael
Suraiya
Jeff Huang, Lawrence Rauchwerger
Finding Schedule-Sensitive Branches
FSE 2015
14 Apr 5 NO CLASS
Apr 7 NO CLASS