


default search action
29th ISSTA 2020: Virtual Event, USA
- Sarfraz Khurshid, Corina S. Pasareanu:

ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, USA, July 18-22, 2020. ACM 2020, ISBN 978-1-4503-8008-9
Fuzzing
- Andrea Fioraldi

, Daniele Cono D'Elia
, Emilio Coppa
:
WEIZZ: automatic grey-box fuzzing for structured binary formats. 1-13 - Yuqi Chen, Bohan Xuan, Christopher M. Poskitt

, Jun Sun, Fan Zhang:
Active fuzzing for testing and securing cyber-physical systems. 14-26 - Björn Mathis, Rahul Gopinath, Andreas Zeller

:
Learning input tokens for effective fuzzing. 27-37
Symbolic Execution and Constraint Solving
- Peisen Yao, Qingkai Shi

, Heqing Huang
, Charles Zhang:
Fast bit-vector satisfiability. 38-50 - David Trabish, Noam Rinetzky:

Relocatable addressing model for symbolic execution. 51-62 - Frank Busse

, Martin Nowack
, Cristian Cadar
:
Running symbolic execution forever. 63-74
Repair and Debug
- Yiling Lou, Ali Ghanbari

, Xia Li, Lingming Zhang, Haotian Zhang, Dan Hao
, Lu Zhang:
Can automated program repair refine fault localization? a unified debugging approach. 75-87 - Raja Ben Abdessalem, Annibale Panichella, Shiva Nejati, Lionel C. Briand, Thomas Stifter:

Automated repair of feature interaction failures in automated driving systems. 88-100 - Thibaud Lutellier

, Hung Viet Pham, Lawrence Pang, Yitong Li, Moshi Wei, Lin Tan:
CoCoNuT: combining context-aware neural translation models using ensemble for program repair. 101-114
Mobile Apps
- Xueliang Li, Yuming Yang, Yepang Liu, John P. Gallagher

, Kaishun Wu
:
Detecting and diagnosing energy issues for mobile applications. 115-127 - Hui Liu, Mingzhu Shen, Jiahao Jin, Yanjie Jiang:

Automated classification of actions in bug reports of mobile apps. 128-140 - Oliviero Riganelli, Simone Paolo Mottadelli, Claudio Rota

, Daniela Micucci, Leonardo Mariani:
Data loss detector: automatically revealing data loss bugs in Android apps. 141-152
Machine Learning I
- Minxue Pan, An Huang, Guoxin Wang, Tian Zhang, Xuandong Li:

Reinforcement learning based curiosity-driven testing of Android applications. 153-164 - Seokhyun Lee, Sooyoung Cha, Dain Lee, Hakjoo Oh:

Effective white-box testing of deep neural networks with adaptive neuron-selection strategy. 165-176 - Yang Feng, Qingkai Shi

, Xinyu Gao
, Jun Wan, Chunrong Fang
, Zhenyu Chen:
DeepGini: prioritizing massive tests to enhance the robustness of deep neural networks. 177-188
Machine Learning II
- Saeid Tizpaz-Niari, Pavol Cerný, Ashutosh Trivedi:

Detecting and understanding real-world differential performance bugs in machine learning libraries. 189-199 - Arnab Sharma, Heike Wehrheim:

Higher income, larger loan? monotonicity testing of machine learning models. 200-210 - Saikat Dutta, August Shi, Rutvik Choudhary, Zhekun Zhang, Aryaman Jain, Sasa Misailovic:

Detecting flaky tests in probabilistic and machine learning applications. 211-224
Bug Localization and Test Isolation
- Michael Pradel, Vijayaraghavan Murali, Rebecca Qian, Mateusz Machalica, Erik Meijer, Satish Chandra:

Scaffle: bug localization on millions of files. 225-236 - Rahul Gopinath, Alexander Kampmann, Nikolas Havrikov

, Ezekiel O. Soremekun
, Andreas Zeller
:
Abstracting failure-inducing inputs. 237-248 - Pengyu Nie, Ahmet Çelik, Matthew Coley, Aleksandar Milicevic, Jonathan Bell

, Milos Gligoric:
Debugging the performance of Maven's test isolation: experience report. 249-259
Security
- Ismet Burak Kadron, Nicolás Rosner, Tevfik Bultan:

Feedback-driven side-channel analysis for networked applications. 260-271 - Mohannad Alhanahnah, Clay Stevens

, Hamid Bagheri:
Scalable analysis of interaction threats in IoT systems. 272-285 - Muyang Liu, Ke Li, Tao Chen:

DeepSQLi: deep semantic learning for testing SQL injection. 286-297
Regression Testing
- Wing Lam, August Shi, Reed Oei, Sai Zhang, Michael D. Ernst, Tao Xie:

Dependent-test-aware regression testing techniques. 298-311 - Patrice Godefroid, Daniel Lehmann

, Marina Polishchuk:
Differential regression testing for REST APIs. 312-323 - Qianyang Peng, August Shi, Lingming Zhang:

Empirically revisiting and enhancing IR-based test-case prioritization. 324-336
Challenging Domains
- Per Erik Strandberg, Thomas J. Ostrand, Elaine J. Weyuker, Wasif Afzal

, Daniel Sundmark:
Intermittently failing tests in the embedded systems domain. 337-348 - Carl Hildebrandt

, Sebastian G. Elbaum, Nicola Bezzo, Matthew B. Dwyer
:
Feasible and stressful trajectory generation for mobile robots. 349-362 - Hui Li, Dong Wang

, Tianze Huang, Yu Gao, Wensheng Dou, Lijie Xu, Wei Wang, Jun Wei, Hua Zhong:
Detecting cache-related bugs in Spark applications. 363-375
Binary Analysis
- Yifei Xu, Zhengzi Xu, Bihuan Chen, Fu Song, Yang Liu

, Ting Liu:
Patch based vulnerability matching for binary programs. 376-387 - George Fourtounis, Leonidas Triantafyllou, Yannis Smaragdakis:

Identifying Java calls in native code via binary scanning. 388-400 - Muhui Jiang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu

, Kui Ren:
An empirical study on ARM disassembly tools. 401-414
Static Analysis and Search-Based Testing
- Asem Ghaleb

, Karthik Pattabiraman:
How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection. 415-427 - Dominik Helm

, Florian Kübler, Jan Thomas Kölzer, Philipp Haller, Michael Eichberg
, Guido Salvaneschi
, Mira Mezini:
A programming model for semi-implicit parallelization of static analyses. 428-439 - Yun Lin, Jun Sun, Gordon Fraser, Ziheng Xiu, Ting Liu, Jin Song Dong:

Recovering fitness gradients for interprocedural Boolean flags in search-based testing. 440-451
Build Testing
- Kaiyuan Wang, Greg Tener, Vijay Gullapalli, Xin Huang, Ahmed Gad, Daniel Rall:

Scalable build service system with smart scheduling service. 452-462 - Gang Fan, Chengpeng Wang, Rongxin Wu

, Xiao Xiao, Qingkai Shi
, Charles Zhang:
Escaping dependency hell: finding build dependency errors with the unified dependency graph. 463-474 - Zhibo Liu

, Shuai Wang:
How far we have come: testing decompilation correctness of C decompilers. 475-487
Numerical Software Analysis and Clone Detection
- Jackson Vanover

, Xuan Deng, Cindy Rubio-González:
Discovering discrepancies in numerical libraries. 488-501 - Xiao He, Xingwei Wang, Jia Shi, Yi Liu:

Testing high performance numerical simulation programs: experience, lessons learned, and open issues. 502-515 - Chunrong Fang

, Zixi Liu, Yangyang Shi, Jeff Huang, Qingkai Shi
:
Functional code clone detection with syntax and semantics fusion learning. 516-527 - Yakun Zhang, Wensheng Dou, Jiaxin Zhu, Liang Xu, Zhiyong Zhou, Jun Wei, Dan Ye, Bo Yang:

Learning to detect table clones in spreadsheets. 528-540
Tool Demonstrations
- Ali Ghanbari

:
ObjSim: lightweight automatic patch prioritization via object similarity. 541-544 - Chao Guo, Tieke He, Wei Yuan, Yue Guo, Rui Hao:

Crowdsourced requirements generation for automatic testing via knowledge graph. 545-548 - Zichen Guo, Jiawei Liu, Tieke He, Zhuoyang Li, Peitian Zhangzhu:

TauJud: test augmentation of machine learning in judicial documents. 549-552 - Wentian Yan, Jianbo Gao, Zhenhao Wu, Yue Li, Zhi Guan, Qingshan Li, Zhong Chen:

EShield: protect smart contracts against reverse engineering. 553-556 - Gustavo Grieco, Will Song, Artur Cygan, Josselin Feist, Alex Groce:

Echidna: effective, usable, and fast fuzzing for smart contracts. 557-560 - George Thompson, Allison K. Sullivan

:
ProFL: a fault localization framework for Prolog. 561-564 - Yang Zhang, Shuai Shao

, Juan Zhai
, Shiqing Ma:
FineLock: automatically refactoring coarse-grained locks into fine-grained locks. 565-568 - Ezio Bartocci

, Niveditha Manjunath, Leonardo Mariani, Cristinel Mateis
, Dejan Nickovic, Fabrizio Pastore
:
CPSDebug: a tool for explanation of failures in cyber-physical systems. 569-572 - Ruixiang Qian, Yuan Zhao, Duo Men, Yang Feng, Qingkai Shi, Yong Huang, Zhenyu Chen:

Test recommendation system based on slicing coverage filtering. 573-576
Doctoral Symposium
- Feng Xue:

Automated mobile apps testing from visual perspective. 577-581 - Luis Gustavo Araujo Rodriguez

, Daniel Macêdo Batista:
Program-aware fuzzing for MQTT applications. 582-586 - João Choma Neto:

Automatic support for the identification of infeasible testing requirements. 587-591

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














