{"id":"https://openalex.org/W4415706969","doi":"https://doi.org/10.1109/tdsc.2025.3626811","title":"MSTest: A Property-Oriented, Comprehensive, and Cross-Platform Test Suite of Memory Safety","display_name":"MSTest: A Property-Oriented, Comprehensive, and Cross-Platform Test Suite of Memory Safety","publication_year":2025,"publication_date":"2025-10-30","ids":{"openalex":"https://openalex.org/W4415706969","doi":"https://doi.org/10.1109/tdsc.2025.3626811"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3626811","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3626811","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102009518","display_name":"C. Ou-Yang","orcid":"https://orcid.org/0000-0002-1555-2794"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ciyan Ouyang","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115028438","display_name":"Da Xie","orcid":"https://orcid.org/0009-0005-0815-4578"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Da Xie","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023480218","display_name":"Hao Ma","orcid":"https://orcid.org/0000-0002-0927-1005"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Ma","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101887493","display_name":"Wei Song","orcid":"https://orcid.org/0000-0001-5649-1580"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Song","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005910807","display_name":"Jiameng Ying","orcid":"https://orcid.org/0000-0003-0576-3202"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiameng Ying","raw_affiliation_strings":["Big Data Center of the Ministry of Public Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Big Data Center of the Ministry of Public Security, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015271407","display_name":"Si\u2010Hao Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sihao Shen","raw_affiliation_strings":["Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["Pennsylvania State University, Pennsylvania, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, Pennsylvania, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102009518"],"corresponding_institution_ids":["https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17105047,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"2371","last_page":"2386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9056000113487244,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9056000113487244,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.01510000042617321,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.01080000028014183,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/test-suite","display_name":"Test suite","score":0.6807000041007996},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.6229000091552734},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.5177000164985657},{"id":"https://openalex.org/keywords/memory-errors","display_name":"Memory errors","score":0.49079999327659607},{"id":"https://openalex.org/keywords/porting","display_name":"Porting","score":0.4596000015735626},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.41339999437332153},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41130000352859497},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.4025999903678894},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.3849000036716461}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7918000221252441},{"id":"https://openalex.org/C151552104","wikidata":"https://www.wikidata.org/wiki/Q7705809","display_name":"Test suite","level":4,"score":0.6807000041007996},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.6229000091552734},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.5177000164985657},{"id":"https://openalex.org/C119907115","wikidata":"https://www.wikidata.org/wiki/Q6815725","display_name":"Memory errors","level":3,"score":0.49079999327659607},{"id":"https://openalex.org/C106251023","wikidata":"https://www.wikidata.org/wiki/Q851989","display_name":"Porting","level":3,"score":0.4596000015735626},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4413999915122986},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41659998893737793},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.41339999437332153},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41130000352859497},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.4025999903678894},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.3849000036716461},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.35589998960494995},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.34130001068115234},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.32710000872612},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.32170000672340393},{"id":"https://openalex.org/C3017990537","wikidata":"https://www.wikidata.org/wiki/Q6815759","display_name":"Memory test","level":3,"score":0.3188000023365021},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.29660001397132874},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.29649999737739563},{"id":"https://openalex.org/C171675096","wikidata":"https://www.wikidata.org/wiki/Q1143380","display_name":"Extended memory","level":4,"score":0.2858999967575073},{"id":"https://openalex.org/C148493468","wikidata":"https://www.wikidata.org/wiki/Q2646951","display_name":"Functional safety","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C188598960","wikidata":"https://www.wikidata.org/wiki/Q7705805","display_name":"Test strategy","level":3,"score":0.27869999408721924},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.2766000032424927},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.2703999876976013},{"id":"https://openalex.org/C53838383","wikidata":"https://www.wikidata.org/wiki/Q541148","display_name":"Conventional memory","level":5,"score":0.2678999900817871},{"id":"https://openalex.org/C109852812","wikidata":"https://www.wikidata.org/wiki/Q2406355","display_name":"Test harness","level":5,"score":0.2549999952316284},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3626811","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3626811","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1495630617","https://openalex.org/W1538332098","https://openalex.org/W1969501726","https://openalex.org/W2018688088","https://openalex.org/W2020208333","https://openalex.org/W2025411198","https://openalex.org/W2042856445","https://openalex.org/W2065355472","https://openalex.org/W2117798902","https://openalex.org/W2122312154","https://openalex.org/W2159059513","https://openalex.org/W2903035991","https://openalex.org/W2963934162","https://openalex.org/W3106633543","https://openalex.org/W4238851087","https://openalex.org/W4239042909","https://openalex.org/W4281389808","https://openalex.org/W4391935180"],"related_works":[],"abstract_inverted_index":{"The":[0],"foundation":[1],"of":[2,25,33,50,66,68,101,106,123,205],"current":[3,148],"software":[4,30],"ecosystem":[5],"is":[6,78,114,144,177],"still":[7],"unfortunately":[8],"laid":[9],"on":[10,43,81,109,198],"memory":[11,36,107,136,181,207],"unsafe":[12],"languages,":[13],"such":[14],"as":[15,21],"C/C++.":[16],"Memory":[17],"safety":[18,37,108,137,182,208],"vulnerabilities":[19],"remain":[20],"the":[22,28,34,48,115,152,178],"primary":[23],"source":[24],"bugs":[26],"in":[27,47],"critical":[29],"stacks.":[31],"Some":[32],"advanced":[35],"defenses":[38,69],"are":[39],"beginning":[40],"to":[41,89,131,169],"land":[42],"commercially":[44],"available":[45],"platforms,":[46],"form":[49],"instruction-set":[51],"architecture":[52],"extensions,":[53],"runtime":[54],"enforcement":[55],"by":[56],"standard":[57],"libraries":[58],"and":[59,61,166,200,203],"OSes,":[60],"compile-time":[62],"checks.":[63],"This":[64],"tide":[65],"adoption":[67],"brings":[70],"us":[71],"several":[72],"questions:":[73],"For":[74,94,117],"a":[75,82,95,98,104,110,135,158,195],"defense":[76,96,201],"that":[77],"claimed":[79],"supported":[80],"platform,":[83,111],"can":[84],"it":[85],"be":[86],"actually":[87],"deployed":[88],"directly":[90],"benefit":[91],"an":[92],"application?":[93],"claiming":[97],"certain":[99],"level":[100],"protection":[102],"regarding":[103],"type":[105],"how":[112],"solid":[113],"protection?":[116],"two":[118],"platforms":[119],"implementing":[120],"similar":[121],"types":[122],"defenses,":[124],"which":[125],"one":[126],"provides":[127],"better":[128],"guarantees?":[129],"Endeavor":[130],"answer":[132],"these":[133],"questions,":[134],"test":[138,150,153,164,183,192],"suite,":[139],"namely":[140],"<italic":[141],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[142],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">MSTest</i>,":[143],"implemented.":[145],"With":[146],"its":[147],"227":[149],"cases,":[151,193],"suite":[154,184],"has":[155],"already":[156],"reached":[157],"wider":[159],"coverage":[160,197],"than":[161],"all":[162],"existing":[163],"suites":[165],"been":[167],"ported":[168],"19":[170],"platforms.":[171,210],"To":[172],"our":[173],"best":[174],"knowledge,":[175],"MSTest":[176],"first":[179],"portable":[180],"conducting":[185],"property-oriented":[186],"testing,":[187],"automatically":[188],"resolving":[189],"dependency":[190],"between":[191],"providing":[194],"comprehensive":[196],"attack":[199],"capabilities,":[202],"capable":[204],"comparing":[206],"cross":[209]},"counts_by_year":[],"updated_date":"2026-03-17T06:59:57.516163","created_date":"2025-10-30T00:00:00"}
