Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis 2022
DOI: 10.1145/3533767.3543291
|View full text |Cite
|
Sign up to set email alerts
|

Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Liu et al (2020) have already shown that, at a more careful semantic analysis, several APR outcomes pass all tests but are actually wrong. What we have shown in this paper is that the PoV-based method proposed by Pinconschi et al (2021Pinconschi et al ( , 2022 and by Bui et al (2022) is not enough to guarantee semantic correctness of the fixes, even in the presence of a perfect selection of the bug location.…”
Section: Novelty and Contributionmentioning
confidence: 80%
See 1 more Smart Citation
“…Liu et al (2020) have already shown that, at a more careful semantic analysis, several APR outcomes pass all tests but are actually wrong. What we have shown in this paper is that the PoV-based method proposed by Pinconschi et al (2021Pinconschi et al ( , 2022 and by Bui et al (2022) is not enough to guarantee semantic correctness of the fixes, even in the presence of a perfect selection of the bug location.…”
Section: Novelty and Contributionmentioning
confidence: 80%
“…Platforms for automated analysis of test-based APR tools are well developed and, recently, have also been used for security vulnerabilities. For example, Durieux et al (2019) have proposed a toolchain for the automatic analysis of several APR tools in Java, Pinconschi et al (2021) have presented an evaluation of APR tools for C vulnerabilities, and Pinconschi et al (2022) have proposed a toolchain for the automatic execution of APR tools for vulnerabilities in C and Java. The key difference between traditional APR test suites and AVR test suites is that the latter contains a special test case, called Proof of Vulnerability (PoV) test, which reveals the presence of a vulnerability in the program.…”
Section: Novelty and Contributionmentioning
confidence: 99%
“…Design-level security automation is possible with an acceptable precision value, which provides significant approval of the techniques adopted. Pinconschi et al [ 23 ] developed a tool that automatically repairs software vulnerabilities using the decentralized platform with RESTful APIs and has low overheads. Finally, the tool can be an extensible repair tool for container-based service instances to check and repair vulnerabilities.…”
Section: Resultsmentioning
confidence: 99%