Typestate-guided fuzzer for discovering use-after-free vulnerabilities

H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin… - Proceedings of the …, 2020 - dl.acm.org
Existing coverage-based fuzzers usually use the individual control flow graph (CFG) edge
coverage to guide the fuzzing process, which has shown great potential in finding …

Prevalence of coincidental correctness and mitigation of its impact on fault localization

W Masri, RA Assi - ACM transactions on software engineering and …, 2014 - dl.acm.org
Researchers have argued that for failure to be observed the following three conditions must
be met: CR= the defect was reached; CI= the program has transitioned into an infectious …

Cleansing test suites from coincidental correctness to enhance fault-localization

W Masri, R Abou Assi - 2010 third international conference on …, 2010 - ieeexplore.ieee.org
Researchers have argued that for failure to be observed the following three conditions must
be met: 1) the defect is executed, 2) the program has transitioned into an infectious state …

An empirical study of information flows in real-world javascript

CA Staicu, D Schoepe, M Balliu, M Pradel… - Proceedings of the 14th …, 2019 - dl.acm.org
Information flow analysis prevents secret or untrusted data from flowing into public or trusted
sinks. Existing mechanisms cover a wide array of options, ranging from lightweight taint …

Nodemedic: End-to-end analysis of node. js vulnerabilities with provenance graphs

D Cassel, WT Wong, L Jia - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Packages in the Node. js ecosystem often suffer from serious vulnerabilities such as
arbitrary command injection and code execution. Existing taint analysis tools fall short in …

Fault localization based on information flow coverage

W Masri - Software Testing, Verification and Reliability, 2010 - Wiley Online Library
Failures triggered by hard to debug defects usually involve complex interactions between
many program elements. This paper hypothesizes that information flows present a good …

An analysis of the relationship between conditional entropy and failed error propagation in software testing

K Androutsopoulos, D Clark, H Dan… - Proceedings of the 36th …, 2014 - dl.acm.org
Failed error propagation (FEP) is known to hamper software testing, yet it remains poorly
understood. We introduce an information theoretic formulation of FEP that is based on …

An empirical study of the factors that reduce the effectiveness of coverage-based fault localization

W Masri, R Abou-Assi, M El-Ghali… - Proceedings of the 2nd …, 2009 - dl.acm.org
Coverage-based fault localization techniques typically assign a suspiciousness rank to the
statements in a program following an analysis of the coverage of certain types of program …

Automated fault localization: advances and challenges

W Masri - Advances in Computers, 2015 - Elsevier
Following a program failure, the main concern of the developer is to identify what caused it
in order to repair the code that induced it. The first activity is termed fault localization …

A program slicing-based method for effective detection of coincidentally correct test cases

F Feyzi, S Parsa - Computing, 2018 - Springer
Despite the proven applicability of the spectrum-based fault localization (SBFL) methods,
their effectiveness may be degraded due to the presence of coincidental correctness, which …