Silent Compiler Bug De-duplication via Three-Dimensional Analysis
Compiler testing is an important task for assuring the quality of compilers, but investigating test failures is very time-consuming. This is because many test failures are caused by the same compiler bug (known as bug duplication problem). In particular, this problem becomes much more challenging on silent compiler bugs (also called wrong code bugs), since these bugs can provide little information (unlike crash bugs that can produce error messages) for bug de-duplication. In this work, we propose a novel technique (called $D^3$) to solve the duplication problem on silent compiler bugs. Its key insight is to characterize the silent bugs from the testing process and identify three-dimensional information (i.e., test program, optimizations, and test execution) for bug de-duplication. However, there are huge amount of bug-irrelevant details on the three dimensions, $D^3$ then systematically conducts causal analysis to identify bug-causal features from each of the three dimensions for more accurate bug de-duplication. Finally, $D^3$ ranks the test failures that are more likely to be caused by different silent bugs higher by measuring the distance among test failures based on the three-dimensional bug-causal features. Our experimental results on four datasets (including duplicate bugs of both GCC and LLVM) demonstrate the significant superiority of $D^3$ over the two state-of-the-art compiler bug de-duplication techniques, achieving the average improvement of 19.36% and 51.43% in identifying unique silent compiler bugs when analyzing the same number of test failures.
Wed 19 JulDisplayed time zone: Pacific Time (US & Canada) change
15:30 - 17:00 | ISSTA Online 5: Domain-Specific TestingTechnical Papers at Habib Classroom (Gates G01) Chair(s): Michal Young University of Oregon | ||
15:30 10mTalk | DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity Technical Papers Zhuo Chen Zhejiang University; Ant Group, Jie Liu Ant Group, Yubo Hu Xidian University, Lei Wu Zhejiang University, Yajin Zhou Zhejiang University, Yiling He Zhejiang University, Xianhao Liao Ant Group, Ke Wang Ant Group, Jinku Li Xidian University, Zhan Qin Zhejiang University DOI | ||
15:40 10mTalk | Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation Technical Papers Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Haoxiang Jia Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Xiaotong Huang Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology DOI | ||
15:50 10mTalk | DDLDroid: Efficiently Detecting Data Loss Issues in Android Apps Technical Papers Yuhao Zhou Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology DOI | ||
16:00 10mTalk | Exploring Missed Optimizations in WebAssembly Optimizers Technical Papers Zhibo Liu Hong Kong University of Science and Technology, Dongwei Xiao Hong Kong University of Science and Technology, Li Zongjie Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology, Wei Meng Chinese University of Hong Kong DOI | ||
16:10 10mTalk | Vectorizing Program Ingredients for Better JVM Testing Technical Papers Tianchang Gao Tianjin University, Junjie Chen Tianjin University, Yingquan Zhao Tianjin University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
16:20 10mTalk | 1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing Technical Papers Songtao Yang Tsinghua University, Yubo He Information Engineering University, Kaixiang Chen Tsinghua University, Zheyu Ma Tsinghua University, Xiapu Luo Hong Kong Polytechnic University, Yong Xie Qinghai University, Jianjun Chen Tsinghua University, Chao Zhang Tsinghua University DOI | ||
16:30 10mTalk | SBDT: Search-Based Differential Testing of Certificate Parsers in SSL/TLS Implementations Technical Papers Chu Chen Qufu Normal University, Pinghong Ren Qufu Normal University, Zhenhua Duan Xidian University, Cong Tian Xidian University, Xu Lu Xidian University, Bin Yu Xidian University DOI | ||
16:40 10mTalk | Silent Compiler Bug De-duplication via Three-Dimensional Analysis Technical Papers Chen Yang Tianjin University, Junjie Chen Tianjin University, Xingyu Fan Tianjin University, Jiajun Jiang Tianjin University, Jun Sun Singapore Management University DOI | ||
16:50 10mTalk | Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features Technical Papers Yiming Zhang Southern University of Science and Technology; Hong Kong Polytechnic University, Yuxin Hu Southern University of Science and Technology, Haonan Li Southern University of Science and Technology, Wenxuan Shi Southern University of Science and Technology, Zhenyu Ning Hunan University; Southern University of Science and Technology, Xiapu Luo Hong Kong Polytechnic University, Fengwei Zhang Southern University of Science and Technology DOI |