{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:25Z","timestamp":1750309165939,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1145\/3639476.3639763","type":"proceedings-article","created":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T15:15:01Z","timestamp":1716563701000},"page":"32-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond a Joke: Dead Code Elimination Can Delete Live Code"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2389-1881","authenticated-orcid":false,"given":"Haoxin","family":"Tu","sequence":"first","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"},{"name":"School of Software, Dalian University of Technology, Dalian, Liaoning Provice, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4336-8548","authenticated-orcid":false,"given":"Lingxiao","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0168-6230","authenticated-orcid":false,"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8674-4948","authenticated-orcid":false,"given":"He","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian, Liaoning Provice, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aho Alfred V Lam Monica S Sethi Ravi Ullman Jeffrey D et al. 2007. Compilers-principles techniques and tools. pearson Education."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the International Symposium on Software Testing and Analysis (ISSTA). 70--81","author":"Alipour Mohammad Amin","year":"2016","unstructured":"Mohammad Amin Alipour, Alex Groce, Rahul Gopinath, and Arpit Christi. 2016. Generating focused random tests using directed swarm testing. In Proceedings of the International Symposium on Software Testing and Analysis (ISSTA). 70--81."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE). 1153--1164","author":"Khadra M. Ammar Ben","year":"2020","unstructured":"M. Ammar Ben Khadra, Dominik Stoffel, and Wolfgang Kunz. 2020. Efficient Binary-Level Coverage Analysis. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE). 1153--1164."},{"key":"e_1_3_2_1_4_1","unstructured":"Jeremy Bennett. 2024. How Much Does a Compiler Cost? Retrieved 08\/01\/2024 from https:\/\/www.embecosm.com\/2018\/02\/26\/how-much-does-a-compiler-cost\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00037"},{"key":"e_1_3_2_1_6_1","unstructured":"Developers. 2024. Xdead Implementation. Retrieved 01\/08\/2024 from https:\/\/github.com\/haoxintu\/Xdead"},{"key":"e_1_3_2_1_7_1","unstructured":"GCC Developers. 2024. GCC Testsuite. Retrieved 01\/08\/2024 from https:\/\/github.com\/gcc-mirror\/gcc\/tree\/master\/gcc\/testsuite"},{"key":"e_1_3_2_1_8_1","unstructured":"LLVM Developers. 2023. LibTooling. Retrieved 01\/08\/2024 from https:\/\/clang.llvm.org\/docs\/LibTooling.html"},{"key":"e_1_3_2_1_9_1","unstructured":"LLVM Developers. 2024. Bug fixing commit before we reported the bug. Retrieved 01\/08\/2024 from https:\/\/reviews.llvm.org\/D94106"},{"key":"e_1_3_2_1_10_1","unstructured":"LLVM Developers. 2024. LLVM Testsuite. Retrieved 01\/08\/2024 from https:\/\/github.com\/llvm\/llvm-project\/tree\/main\/clang\/test"},{"key":"e_1_3_2_1_11_1","volume-title":"SPEC CINT2006 Benchmarks. Retrieved 01\/08\/2024 from https:\/\/www.spec.org\/cpu2006\/CINT2006\/","author":"Developers SPEC","year":"2024","unstructured":"SPEC Developers. 2024. SPEC CINT2006 Benchmarks. Retrieved 01\/08\/2024 from https:\/\/www.spec.org\/cpu2006\/CINT2006\/"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"CsmithEdge: more effective compiler testing by handling undefined behaviour less conservatively","volume":"27","author":"Even-Mendoza Karine","year":"2022","unstructured":"Karine Even-Mendoza, Cristian Cadar, and Alastair F Donaldson. 2022. CsmithEdge: more effective compiler testing by handling undefined behaviour less conservatively. Empirical Software Engineering 27, 6 (2022), 1--35.","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Information and Communications Security (ICICS). 238--255","author":"Gao Debin","year":"2008","unstructured":"Debin Gao, Michael K Reiter, and Dawn Song. 2008. Binhunt: Automatically finding semantic differences in binary programs. In International Conference on Information and Communications Security (ICICS). 238--255."},{"key":"e_1_3_2_1_14_1","unstructured":"Godbolt. 2024. Execution results on buggy and non-buggy compilers for bug 1. Retrieved 01\/08\/2024 from https:\/\/godbolt.org\/z\/z7zxexfr1"},{"key":"e_1_3_2_1_15_1","unstructured":"Godbolt. 2024. Execution results on buggy and non-buggy compilers for bug 2. Retrieved 01\/08\/2024 from https:\/\/godbolt.org\/z\/xos1d64xo"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3058671"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594334"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 386--399","author":"Le Vu","year":"2015","unstructured":"Vu Le, Chengnian Sun, and Zhendong Su. 2015. Finding Deep Compiler Bugs via Guided Stochastic Program Mutation. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 386--399."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428264"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 291--401","author":"Obbink Niels Groot","year":"2018","unstructured":"Niels Groot Obbink, Ivano Malavolta, Gian Luca Scoccia, and Patricia Lago. 2018. An extensible approach for taming the challenges of JavaScript dead code elimination. In Proceedings of the 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 291--401."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_1_23_1","unstructured":"Bug Report. 2024. LLVM Issue 63121. Retrieved 01\/08\/2024 from https:\/\/github.com\/llvm\/llvm-project\/issues\/63121"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of IEEE Symposium on Security and Privacy (S&P). 138--157","author":"Shoshitaishvili Yan","year":"2016","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, et al. 2016. Sok:(state of) the art of war: Offensive techniques in binary analysis. In Proceedings of IEEE Symposium on Security and Privacy (S&P). 138--157."},{"key":"e_1_3_2_1_25_1","volume-title":"The Network and Distributed System Security Symposium (NDSS)","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting fuzzing through selective symbolic execution. In The Network and Distributed System Security Symposium (NDSS), Vol. 16. 1--16."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 849--863","author":"Sun Chengnian","year":"2016","unstructured":"Chengnian Sun, Vu Le, and Zhendong Su. 2016. Finding Compiler Bugs via Live Code Mutation. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 849--863."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3119186"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Theodoros Theodoridis Manuel Rigger and Zhendong Su. 2022. Finding Missed Optimizations through the Lens of Dead Code Elimination. 697--709.","DOI":"10.1145\/3503222.3507764"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 33rd International Symposium on Software Reliability Engineering (ISSRE). 529--540","author":"Tu Haoxin","year":"2022","unstructured":"Haoxin Tu, He Jiang, Xiaochen Li, Zhilei Ren, Zhide Zhou, and Lingxiao Jiang. 2022. Remgen: Remanufacturing a Random Program Generator for Compiler Testing. In Proceedings of the 33rd International Symposium on Software Reliability Engineering (ISSRE). 529--540."},{"key":"e_1_3_2_1_30_1","volume-title":"IEEE Transactions on Reliability","author":"Tu Haoxin","year":"2022","unstructured":"Haoxin Tu, He Jiang, Zhide Zhou, Yixuan Tang, Zhilei Ren, Lei Qiao, and Lingxiao Jiang. 2022. Detecting C++ Compiler Front-End Bugs via Grammar Mutation and Differential Testing. IEEE Transactions on Reliability (2022), 343 -- 357."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TSE.2021.3093926","article-title":"BinDiff NN: Learning Distributed Representation of Assembly for Robust Binary Diffing against Semantic Differences","volume":"48","author":"Ullah Sami","year":"2021","unstructured":"Sami Ullah and Heekuck Oh. 2021. BinDiff NN: Learning Distributed Representation of Assembly for Robust Binary Diffing against Semantic Differences. IEEE Transactions on Software Engineering 48, 9 (2021), 3442--3466.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 363--376","author":"Xu Xiaojun","year":"2017","unstructured":"Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, and Dawn Song. 2017. Neural network-based graph embedding for cross-platform binary code similarity detection. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 363--376."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 283--294","author":"Yang Xuejun","year":"2011","unstructured":"Xuejun Yang, Yang Chen, Eric Eide, and John Regehr. 2011. Finding and Understanding Bugs in C Compilers. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 283--294."}],"event":{"name":"ICSE-NIER'24: 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"],"location":"Lisbon Portugal","acronym":"ICSE-NIER'24"},"container-title":["Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639476.3639763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3639476.3639763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:38Z","timestamp":1750287218000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639476.3639763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":33,"alternative-id":["10.1145\/3639476.3639763","10.1145\/3639476"],"URL":"https:\/\/doi.org\/10.1145\/3639476.3639763","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]},"assertion":[{"value":"2024-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}