1 |
Jan 5
|
Introduction Representations
Project 1
due Jan 20
|
|
2 |
Jan 10
|
Slicing LLVM LLVM Demo
|
|
|
Jan 12
|
Static Analysis
|
|
Micha Sharir, Amir Pnueli
Two Approaches to Precise Interprocedural Dataflow Analysis
Program Flow Analysis: Theory and Practice
|
|
Florian Martin
Experimental Comparison of Call String and Functional Approaches to Interprocedural Analysis
CC 1999
|
|
Ravi Mangal, Mayur Naik, Hongseok Yang
A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join
ESOP 2014
|
3 |
Jan 17
|
Static Analysis
|
|
Patrick Cousot, Radhia Cousot
Static Verification of Dynamic Type Properties of Variables
|
|
Patrick Cousot, Radhia Cousot
Abstract Interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints
POPL 1977
|
Jan 19
|
Static Analysis
|
|
Thomas Reps, Susan Horwitz, Mooly Sagiv
Precise Interprocedural Dataflow Analysis via Graph Reachability
POPL 1995
|
4 |
Jan 24
|
Dynamic Analysis Project 2 due Feb 13
|
|
Thomas Ball, James Larus
Efficient Path Profiling
MICRO 1996
|
Jan 26
|
Dynamic Analysis Intro to Security
|
|
Konstantin Serebryany, Derek Bruening, Alexander Potapenko, Dmitriy Vyukov
AddressSanitizer: a fast address sanity checker
Usenix ATC 2012
|
5 |
Jan 31
|
Intro to Security Testing and Symbolic Execution
|
|
Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer
Control-Flow Integrity: Precision, Security, and Performance
|
|
Koushik Sen, Christian Cadar
Symbolic Execution for Software Testing: Three Decades Later
CACM, February 2013
Efficient Encodings Counterpoints from fuzzing
|
|
Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi
A Survey of Symbolic Execution Techniques
|
Feb 2
|
Test Case Reduction
|
Nick
|
Andreas Zeller, Ralf Hildebrandt
Simplifying and isolating failure-inducing input.
TSE 2002
Commentary
|
6 |
Feb 7
|
|
Amirali, Hanhan, Hansi
|
Gene Novark, Emery D. Berger
DieHarder: Securing the Heap
CCS 2010
On Github
|
Feb 9
|
|
Grant, Sal, Saad
|
Charlie Curtsinger, Emery D. Berger
STABILIZER: Enabling Statistically Rigorous Performance Evaluation
ASPLOS 2013
On Github Related work: Producing wrong data without doing anything obviously wrong! A pragmatic guide to assessing empirical evaluations
|
7 |
Feb 14
|
READING WEEK
|
|
Feb 16
|
READING WEEK
|
|
8 |
Feb 21
|
|
Robert, Michael, Xiaoyu
|
Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos
Flip Feng Shui: Hammering a Needle in the Software Stack
USENIX Security 2016
|
Feb 23
|
|
Dawson, Evan, Ming Kai
|
Michael D. Ernst, Jake Cockrell, William G. Griswold, David Notkin
Dynamically Discovering Likely Program Invariants to Support Program Evolution
TSE 2001
Download and Related Work Generating test cases for specification mining DySy: Dynamic Symbolic Execution for Invariant Inference iDiscovery: Feedback-Driven Dynamic Invariant Discovery
|
9 |
Feb 28
|
|
Fahad, Xiangyu, Fenco
|
Iftekhar Ahmed, Rahul Gopinath, Caius Brindescu, Alex Groce, Carlos Jensen
Can testedness be effectively measured?
FSE 2016
|
Mar 2
|
|
Patterson, Ken, Warren
|
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications
TSE 2010
Related Work: Mining Input Grammars from Dynamic Taints Extracting Output Formats from Executables
|
10 |
Mar 7
|
|
Chenguang, Iykon, Mark, Rafay
|
Gulsher Laghari, Alessandro Murgia, Serge Demeyer
Fine-tuning spectrum based fault localisation with frequent method item sets
ASE 2016
Programmers Should Still Use Slices When Debugging A User Study Revisiting the Usefulness of Spectra-Based Fault Localization Techniques with Professionals Using Real Bugs from Large Systems Probabilistic Fault Localisation Evaluating & improving fault localization techniques
|
Mar 9
|
|
You?
|
Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, Herbert Bos
VUzzer: Application-aware Evolutionary Fuzzing
NDSS 2017
On GitHub American Fuzzy Lop AFLFast
|
11 |
Mar 14
|
|
Hanhan, Hongpu, Michael, Xiaoyu
|
Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy, Cristina V. Lopes
SourcererCC: Scaling Code Clone Detection to Big-Code
ICSE 2016
On GitHub MOSS (What we use for plagiarism detection) Binary code searches
|
Mar 16
|
|
Fahad, Fenco, Xiangyu
|
Haopeng Liu, Yuxi Chen, Shan Lu
Understanding and Generating High Quality Patches for Concurrency Bugs
FSE 2016
|
12 |
Mar 21
|
|
Chenguang, Mark, Weida
|
Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley
Enhancing Symbolic Execution with Veritesting
ICSE 2014
Unleashing MAYHEM on Binary Code (preceding paper)
|
Mar 23
|
|
Evan, Dawson, Ming Kai
|
Song Wang, Taiyue Liu, Lin Tan
Automatically Learning Semantic Features for Defect Prediction
ICSE 2016
|
13 |
Mar 28
|
|
Grant, Saad, Sal
|
Du Shen, Qi Luo, Denys Poshyvanyk, Mark Grechanik
Automating performance bottleneck detection using search-based application profiling
ISSTA 2015
|
Mar 30
|
|
Himahansi, Amirali
|
Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage
When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC
CCS 2008
|
14 |
Apr 4
|
|
Ken, Patterson, Warren
|
Patrice Godefroid, Adam Kiezun, Michael Y. Levin
Grammar Based Whitebox Fuzzing
PLDI 2008
|
Apr 6
|
LIGHTNING TALKS
|
|
|