Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyFebruary 2025JUST ACCEPTED
Software Engineering for OpenHarmony: A Research Roadmap
- Li Li,
- Xiang Gao,
- Hailong Sun,
- Chunming Hu,
- Xiaoyu Sun,
- Haoyu Wang,
- Haipeng Cai,
- Ting Su,
- Xiapu Luo,
- Tegawendé Bissyande,
- Jacques Klein,
- John Grundy,
- Tao Xie,
- Haibo Chen,
- Huaimin Wang
Mobile software engineering has been a hot research topic for decades. Our fellow researchers have proposed various approaches (with over 7,000 publications for Android alone) in this field that essentially contributed to the great success of the current ...
- review-articleDecember 2024
A survey on EOSIO systems security: vulnerability, attack, and mitigation
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 19, Issue 6https://doi.org/10.1007/s11704-024-3278-yAbstractEOSIO, as a representative of blockchain 3.0 platforms, immediately follows in the footsteps of Bitcoin and Ethereum. It has raised the largest ever initial coin offering, and its market capitalization has reached up to $14.3 billion. Innovatively,...
- surveyDecember 2024
Large Language Models for Software Engineering: A Systematic Literature Review
- Xinyi Hou,
- Yanjie Zhao,
- Yue Liu,
- Zhou Yang,
- Kailong Wang,
- Li Li,
- Xiapu Luo,
- David Lo,
- John Grundy,
- Haoyu Wang
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 8Article No.: 220, Pages 1–79https://doi.org/10.1145/3695988Large Language Models (LLMs) have significantly impacted numerous domains, including Software Engineering (SE). Many recent publications have explored LLMs applied to various SE tasks. Nevertheless, a comprehensive understanding of the application, ...
- research-articleDecember 2024
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1016–1030https://doi.org/10.1145/3658644.3690329nial-of-Service (DoS) attacks at the execution layer represent one of the most severe threats to blockchain systems, compromising availability by depleting the resources of victims. To counteract these attacks, many blockchains have implemented unique ...
- research-articleDecember 2024
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1626–1640https://doi.org/10.1145/3658644.3690294With the emergence of the open API ecosystem, third-party developers can publish their APIs on the API marketplace, significantly facilitating the development of cutting-edge features and services. The RapidAPI platform is currently the largest API ...
-
- research-articleDecember 2024
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2577–2590https://doi.org/10.1145/3658644.3690256Optimistic rollup protocols are widely adopted as the most popular blockchain scaling solutions. As a dominant implementation, Arbitrum has boasted a total locked value exceeding 18 billion USD, highlighting the significance of optimistic rollups in ...
- research-articleDecember 2024
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 971–985https://doi.org/10.1145/3658644.3690243Zero-knowledge layer 2 protocols emerge as a compelling approach to overcoming blockchain scalability issues by processing transactions through the transaction finalization process. During this process, transactions are efficiently processed off the main ...
- research-articleNovember 2024
Exploring the Security Issues of Real World Assets (RWA)
DeFi '24: Proceedings of the Workshop on Decentralized Finance and SecurityPages 31–40https://doi.org/10.1145/3689931.3694913Having real-world assets (RWA) tokenized on blockchains has recently been intensively discussed and recognized by DeFi ecosystem and traditional financial institutions as the next growth frontier, with its total value locked (TVL) surpassing \2.5 billion ...
- research-articleNovember 2024
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments
- Raphael Hiesgen,
- Marcin Nawrocki,
- Marinho Barcellos,
- Daniel Kopp,
- Oliver Hohlfeld,
- Echo Chan,
- Roland Dobbins,
- Christian Doerr,
- Christian Rossow,
- Daniel R. Thomas,
- Mattijs Jonker,
- Ricky Mok,
- Xiapu Luo,
- John Kristoff,
- Thomas C. Schmidt,
- Matthias Wählisch,
- kc claffy
IMC '24: Proceedings of the 2024 ACM on Internet Measurement ConferencePages 259–279https://doi.org/10.1145/3646547.3688451Motivated by the impressive but diffuse scope of DDoS research and reporting, we undertake a multistakeholder (joint industry-academic) analysis to seek convergence across the best available macroscopic views of the relative trends in two dominant ...
- research-articleNovember 2024
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 11Pages 2983–3006https://doi.org/10.1109/TSE.2024.3464539Although many tools have been developed to detect anomalies in smart contracts, the evaluation of these analysis tools has been hindered by the lack of adequate anomalistic <italic>real-world contracts</italic> (i.e., smart contracts with addresses on ...
- research-articleNovember 2024
<sc>Examiner-Pro</sc>: Testing Arm Emulators Across Different Privileges
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 11Pages 2786–2806https://doi.org/10.1109/TSE.2024.3406900Emulators are commonly employed to construct dynamic analysis frameworks due to their ability to perform fine-grained tracing, monitor full system functionality, and run on diverse operating systems and architectures. Nonetheless, the consistency of ...
- research-articleOctober 2024
Attribution-guided Adversarial Code Prompt Generation for Code Completion Models
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1460–1471https://doi.org/10.1145/3691620.3695517Large language models have made significant progress in code completion, which may further remodel future software development. However, these code completion models are found to be highly risky as they may introduce vulnerabilities unintentionally or be ...
- research-articleOctober 2024
Unravelling Token Ecosystem of EOSIO Blockchain
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 10Pages 5423–5439https://doi.org/10.1109/TKDE.2024.3378381Being the largest Initial Coin Offering project, EOSIO has attracted great interest in cryptocurrency markets. Despite its popularity and prosperity (e.g., 26,311,585,008 token transactions occurred from June 8, 2018 to Aug. 5, 2020), there is almost no ...
- research-articleOctober 2024
ReenRepair: Automatic and semantic equivalent repair of reentrancy in smart contracts
Journal of Systems and Software (JSSO), Volume 216, Issue Chttps://doi.org/10.1016/j.jss.2024.112107AbstractReentrancy, the most notorious vulnerability in smart contracts, has attracted extensive attention. To eliminate reentrancy before deploying contracts, there is a need to locate and repair the contracts. However, existing tools suffer from false ...
Highlights- Introducing ReenRepair: a repair framework for the reentrancy in smart contracts.
- Checking and maintaining the semantic equivalence between the patches and the origin.
- Two repair templates cope with both the correctness and the gas ...
- research-articleSeptember 2024
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis
- Shuwei Song,
- Jiachi Chen,
- Ting Chen,
- Xiapu Luo,
- Teng Li,
- Wenwu Yang,
- Leqing Wang,
- Weijie Zhang,
- Feng Luo,
- Zheyuan He,
- Yi Lu,
- Pan Li
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1682–1694https://doi.org/10.1145/3650212.3680391Move, a programming language for smart contracts, stands out for its focus on security. However, the practical security efficacy of Move contracts remains an open question. This work conducts the first comprehensive empirical study on the security of ...
- research-articleSeptember 2024
Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1440–1452https://doi.org/10.1145/3650212.3680372Blockchain clients are the fundamental element of the blockchain network, each keeping a copy of the blockchain’s ledger. They play a crucial role in ensuring the network’s decentralization, integrity, and stability. As complex software systems, ...
- research-articleSeptember 2024
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 566–577https://doi.org/10.1145/3650212.3680303Symbolic execution has proven effective for code analytics in smart contracts. However, for smart contracts, existing symbolic tools use multiple-transaction symbolic execution, which differs from traditional symbolic tools and also exacerbates the path ...
- research-articleSeptember 2024
FDI: Attack Neural Code Generation Systems through User Feedback Channel
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 528–540https://doi.org/10.1145/3650212.3680300Neural code generation systems have recently attracted increasing attention to improve developer productivity and speed up software development. Typically, these systems maintain a pre-trained neural model and make it available to general users as a ...
- research-articleSeptember 2024
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 89, Pages 1–28https://doi.org/10.1145/3678517The Amazon Alexa marketplace has grown rapidly in recent years due to third-party developers creating large amounts of content and publishing directly to a skills store. Despite the growth of the Amazon Alexa skills store, there have been several ...