programs in SCTBench (Thomson et al., 2016) to de-
tect bugs. Experiments with various real-world soft-
ware will let us evaluate its generality more precisely.
REFERENCES
Bohme, M., Pham, V.-T., and Roychoudhury, A.
(2017). Coverage-Based Greybox Fuzzing as Markov
Chain. IEEE Transactions on Software Engineering,
45(5):489–506.
Brunner, E. and Munzel, U. (2000). The Nonparametric
Behrens-Fisher Problem: Asymptotic Theory and a
Small-Sample Approximation. Biometrical Journal,
42(1):17–25.
Burckhardt, S., Kothari, P., Musuvathi, M., and Na-
garakatte, S. (2010). A randomized scheduler with
probabilistic guarantees of finding bugs. In Proceed-
ings of the Fifteenth International Conference on Ar-
chitectural Support for Programming Languages and
Operating Systems, ASPLOS XV, pages 167–178,
New York, NY, USA. Association for Computing Ma-
chinery.
Cai, Y., Wu, S., and Chan, W. K. (2014). ConLock: A
constraint-based approach to dynamic checking on
deadlocks in multithreaded programs. In Proceed-
ings of the 36th International Conference on Software
Engineering, ICSE 2014, pages 491–502, New York,
NY, USA. Association for Computing Machinery.
Chen, H., Guo, S., Xue, Y., Sui, Y., Zhang, C., Li, Y.,
Wang, H., and Liu, Y. (2020). MUZZ: Thread-aware
Grey-box Fuzzing for Effective Bug Hunting in Mul-
tithreaded Programs. In Proceedings of the 29th
USENIX Security Symposium, SEC’20, pages 2325–
2342, USA. USENIX Association.
Chew, L. and Lie, D. (2010). Kivati: Fast detection and pre-
vention of atomicity violations. In Proceedings of the
5th European Conference on Computer Systems, Eu-
roSys’10, pages 307–320, New York, NY, USA. As-
sociation for Computing Machinery.
Fu, H., Wang, Z., Chen, X., and Fan, X. (2018). A system-
atic survey on automated concurrency bug detection,
exposing, avoidance, and fixing techniques. Software
Quality Journal, 26(3):855–889.
Jiang, Z.-M., Bai, J.-J., Lu, K., and Hu, S.-M.
(2022). Context-Sensitive and Directional Concur-
rency Fuzzing for Data-Race Detection. In Proceed-
ings of the 29th Annual Network and Distributed Sys-
tem Security Symposium, NDSS 2022, Reston, VA. In-
ternet Society.
Joshi, P., Park, C.-S., Sen, K., and Naik, M. (2009). A
randomized dynamic program analysis technique for
detecting real deadlocks. ACM SIGPLAN Notices,
44(6):110–120.
Ko, Y., Zhu, B., and Kim, J. (2022). Fuzzing with automat-
ically controlled interleavings to detect concurrency
bugs. Journal of Systems and Software, 191:111379.
Liu, C., Zou, D., Luo, P., Zhu, B. B., and Jin, H. (2018).
A Heuristic Framework to Detect Concurrency Vul-
nerabilities. In Proceedings of the 34th Annual Com-
puter Security Applications Conference, pages 529–
541, New York, NY, USA. Association for Computing
Machinery.
Miller, B. P., Fredriksen, L., and So, B. (1990). An empiri-
cal study of the reliability of UNIX utilities. Commu-
nications of the ACM, 33(12):32–44.
Musuvathi, M. and Qadeer, S. (2007). Iterative context
bounding for systematic testing of multithreaded pro-
grams. ACM SIGPLAN Notices, 42(6):446–455.
Musuvathi, M., Qadeer, S., Nainar, P. A., Ball, T., Basler,
G., and Neamtiu, I. (2008). Finding and reproducing
heisenbugs in concurrent programs. In Proceedings
of the 8th USENIX Conference on Operating Systems
Design and Implementation, OSDI’08, pages 267–
280, USA. USENIX Association.
Park, S., Lu, S., and Zhou, Y. (2009). CTrigger: Ex-
posing atomicity violation bugs from their hiding
places. ACM SIGARCH Computer Architecture News,
37(1):25–36.
Rawat, S., Jain, V., Kumar, A., Cojocar, L., Giuffrida, C.,
and Bos, H. (2017). VUzzer: Application-aware Evo-
lutionary Fuzzing. In Proceedings of the 24th Annual
Network and Distributed System Security Symposium,
NDSS 2017, Reston, VA. Internet Society.
Sen, K. (2008). Race directed random testing of concurrent
programs. ACM SIGPLAN Notices, 43(6):11–21.
Stephens, N., Grosen, J., Salls, C., Dutcher, A., Wang, R.,
Corbetta, J., Shoshitaishvili, Y., Kruegel, C., and Vi-
gna, G. (2016). Driller: Augmenting Fuzzing Through
Selective Symbolic Execution. In Proceedings of the
23rd Annual Network and Distributed System Security
Symposium, NDSS 2016, Reston, VA. Internet Soci-
ety.
Thomson, P., Donaldson, A. F., and Betts, A. (2016). Con-
currency testing using controlled schedulers: An em-
pirical study. ACM Transactions on Parallel Comput-
ing, 2(4):1–37.
Vinesh, N. and Sethumadhavan, M. (2020). ConFuzz—A
Concurrency Fuzzer. In Proceedings of the 1st In-
ternational Conference on Sustainable Technologies
for Computational Intelligence, volume 1045 of Ad-
vances in Intelligent Systems and Computing, pages
667–691, Singapore. Springer Singapore.
Wen, C., He, M., Wu, B., Xu, Z., and Qin, S. (2022). Con-
trolled concurrency testing via periodical scheduling.
In Proceedings of the 44th International Conference
on Software Engineering, ICSE 2022, pages 474–486,
Pittsburgh Pennsylvania. Association for Computing
Machinery.
Yu, J., Narayanasamy, S., Pereira, C., and Pokam, G.
(2012). Maple: A coverage-driven testing tool for
multithreaded programs. ACM SIGPLAN Notices,
47(10):485–502.
Yun, I., Lee, S., Xu, M., Jang, Y., and Kim, T. (2018).
QSYM: A practical concolic execution engine tai-
lored for hybrid fuzzing. In Proceedings of the 27th
USENIX Security Symposium, SEC’18, pages 745–
761, USA. USENIX Association.
ENASE 2023 - 18th International Conference on Evaluation of Novel Approaches to Software Engineering
282