== Reading List == ***Debugging** *[[http://www.cs.purdue.edu/homes/xyzhang/fall07/Papers/hdd.pdf|[ICSE'06]HDD: hierarchical delta debugging]] *[[http://www.cs.purdue.edu/homes/xyzhang/fall07/Papers/sober.pdf|[FSE'06]``SOBER: Statistical Model-based Bug Localization]] *[[http://portal.acm.org/citation.cfm?id=1555020|[ICSE'09] HOLMES: Effective Statistical Debugging via Efficient Path Profiling]] *[[http://www.cs.purdue.edu/homes/xyzhang/fall07/Papers/Amber.pdf|[Manuscript]Chronicle:Efficient Collection And Storage Of Indexed Program Traces]] *[[http://www.cs.purdue.edu/homes/xyzhang/fall07/Papers/ptql.pdf|[OOPSLA'05]Relational queries over program traces (Tao Bao)]] *[[http://www.cs.purdue.edu/homes/xyzhang/fall07/Papers/PRMiner.pdf|[FSE'05]PR-Miner: Automatically Extracting Implicit Programming Rules and Detecting Violations in Large Software Code (Tao Bao)]] *[[http://thomas-zimmermann.com/publications/files/jeong-esecfse-2009.pdf|[FSE'09] Improving Bug Triage with Bug Tossing Graphs]] ***Testing** *[[http://www.cs.purdue.edu/homes/xyzhang/fall07/Papers/00057624.pdf|Automated Software Test Data Generation]] *[[http://www.cs.purdue.edu/homes/xyzhang/fall07/Papers/fuzz.pdf|Automated Whitebox Fuzz Testing]] *[[http://www.cag.lcs.mit.edu/~rinard/paper/icse09.pdf|[ICSE'09] Taint-Based Directed Whitebox Fuzzing]] *[[http://www.cs.uic.edu/~drmark/Rest.pdf|[ICSE'09] Maintaining and Evolving GUI-Directed Test Scripts]] *[[http://www.cs.purdue.edu/homes/xyzhang/Comp/dsn08.pdf|[DSN'08] Convicting Remote Exploitable Vulnerabilities: An Efficient Input Provenance Based Approach]] *[[http://mir.cs.illinois.edu/~marinov/publications/MisailovicETAL07ParallelKorat.pdf|[FSE'07] Parallel test generation and execution with Korat]] *[[http://mir.cs.illinois.edu/~marinov/publications/DanielETAL07ATRE.pdf|[FSE'07] Automated testing of refactoring engines]] ***Debugging Distributed Systems** *[[http://www.usenix.org/event/nsdi09/tech/full_papers/yabandeh/yabandeh.pdf|[NSDI' 09] CrystalBall : Predicting and Preventing Inconsistencies in Deployed Distributed Systems (Kyu Hyung)]] *[[http://www.usenix.org/event/nsdi09/tech/full_papers/yang/yang.pdf|[NSDI'09] MODIST: Transparent Model Checking of Unmodified Distributed Systems]] *[[http://www.macesystems.org/papers/MaceODB-cc2009.pdf|[CC'09] Live Debugging of Distributed Systems (Yunhui)]] *[[http://www.usenix.org/events/osdi08/tech/full_papers/guo/guo.pdf|[OSDI'08]R2: An Application-Level Kernel for Record and Replay (Yunhui)]] *[[http://www.usenix.org/events/nsdi07/tech/geels.html|[NSDI'07] Friday: Global Comprehension for Distributed Replay]] *[[http://pages.cs.wisc.edu/~liblit/sc-2009/sc-2009.pdf|[SC'09] Scalable Temporal Order Analysis for Large Scale Debugging]] ***Debugging Concurrent Programs** *[[http://pages.cs.wisc.edu/~shanlu/paper/asplos122-lu.pdf|[ASPLOS'09] Learning from mistakes: a comprehensive study on real world concurrency bug characteristics (Kyu Hyung)]] *[[http://cccp.eecs.umich.edu/papers/wang-popl09.pdf|[POPL'09] The theory of deadlock avoidance via discrete control (Dasarath)]] *[[http://portal.acm.org/citation.cfm?id=1453121|[FSE'08]Randomized active atomicity violation detection in concurrent programs]] *[[http://berkeley.intel-research.net/dgay/pubs/06-popl-autolocker.pdf|[POPL'06]Autolocker:synchronization inference for atomic sections]] *[[http://www.eecs.umich.edu/~nsatish/papers/ISCA-09-CPC.pdf|[ISCA'09] A Case for an Interleaving Constrained Shared-Memory Multi-Processor(Dasarath)]] ***Security** *[[http://www.cs.ucsb.edu/~chris/research/doc/oakland09_prospex.pdf|[Oakland'09] Prospex: Protocol Specification Extraction]] *[[http://www.ruiwang.info/papers/panalyst.pdf|[Security'08] Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software]] *[[http://unknown|[CCS'09] Behavior Based Software Theft Detection]] *[[http://www.usenix.org/events/sec09/tech/full_papers/sec09_memory.pdf |[Security'09] Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors]] *[[http://www.usenix.org/events/sec/tech/full_papers/molnar.pdf|[Security'09|Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs]] *[[http://www.adambarth.com/papers/2009/barth-weinberger-song.pdf|[Security'09] Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense (Madhavan)]] *[[http://portal.acm.org/citation.cfm?id=1555036|[ICSE'09] Automatic Creation of SQL Injection and Cross-Site Scripting Attacks (Madhavan)]] *[[http://portal.acm.org/citation.cfm?id=1294261.1294274|[SOSP'07]Bouncer: securing software by blocking bad input (Zhiqiang)]]