![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
30th ISSTA 2021: Virtual Event, Denmark
- Cristian Cadar, Xiangyu Zhang:
ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021. ACM 2021, ISBN 978-1-4503-8459-9
Invited Presentation
- Chris Parnin, Alessandro Orso:
Automated debugging: past, present, and future (ISSTA impact paper award). 1
Web Applications
- Kulani Mahadewa
, Yanjun Zhang, Guangdong Bai
, Lei Bu
, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong:
Identifying privacy weaknesses from multi-party trigger-action integration platforms. 2-15 - Fei Shao, Rui Xu, Wasif Arman Haque, Jingwei Xu, Ying Zhang, Wei Yang
, Yanfang Ye, Xusheng Xiao
:
WebEvo: taming web application evolution via detecting semantic structure changes. 16-28 - Benjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller
:
Modular call graph construction for security scanning of Node.js applications. 29-41
Testing Deep Learning Systems
- Zhe Zhao
, Guangke Chen
, Jingyi Wang, Yiwei Yang
, Fu Song, Jun Sun
:
Attack as defense: characterizing adversarial examples using robustness. 42-55 - Isaac Dunn
, Hadrien Pouget
, Daniel Kroening
, Tom Melham
:
Exposing previously undetectable faults in deep neural networks. 56-66 - Nargiz Humbatova
, Gunel Jahangirova
, Paolo Tonella
:
DeepCrime: mutation testing of deep learning systems based on real faults. 67-78 - Tahereh Zohdinasab
, Vincenzo Riccio
, Alessio Gambi, Paolo Tonella
:
DeepHyperion: exploring the feature space of deep learning-based systems through illumination search. 79-90 - Fitash Ul Haq
, Donghwan Shin
, Lionel C. Briand
, Thomas Stifter, Jun Wang
:
Automatic test suite generation for key-points detection DNNs using many-objective search (experience paper). 91-102 - Lingfeng Zhang
, Yueling Zhang
, Min Zhang
:
Efficient white-box fairness testing through gradient search. 103-114 - Zixi Liu, Yang Feng, Zhenyu Chen:
DialTest: automated testing for recurrent-neural-network-driven dialogue systems. 115-126 - Quan Zhang
, Yifeng Ding
, Yongqiang Tian
, Jianmin Guo, Min Yuan, Yu Jiang
:
AdvDoor: adversarial backdoor attack of deep learning system. 127-138 - Yuanchun Li, Ziqi Zhang, Bingyan Liu, Ziyue Yang, Yunxin Liu:
ModelDiff: testing-based DNN similarity comparison for model reuse detection. 139-151
Android Application Analysis and Testing
- Lei Xue, Yuxiao Yan, Luyi Yan
, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou:
Parema: an unpacking framework for demystifying VM-based Android packers. 152-164 - Wenyu Wang
, Wing Lam, Tao Xie
:
An infrastructure approach to improving effectiveness of Android UI testing tools. 165-176 - Leonardo Mariani
, Ali Mohebbi
, Mauro Pezzè
, Valerio Terragni
:
Semantic matching of GUI events for test reuse: are we there yet? 177-190 - Tongtong Xu, Minxue Pan
, Yu Pei
, Guiyin Li, Xia Zeng, Tian Zhang, Yuetang Deng, Xuandong Li:
GUIDER: GUI structure and vision co-guided test script repair for Android apps. 191-203 - Jingling Sun
, Ting Su
, Junxin Li
, Zhen Dong, Geguang Pu, Tao Xie
, Zhendong Su:
Understanding and finding system setting-related defects in Android apps. 204-215 - Yueming Wu
, Deqing Zou, Wei Yang
, Xiang Li, Hai Jin:
HomDroid: detecting Android covert malware by social-network homophily analysis. 216-229
Fuzzing
- Adrian Herrera
, Hendra Gunadi, Shane Magrath, Michael Norrish
, Mathias Payer
, Antony L. Hosking
:
Seed selection for successful fuzzing. 230-243 - Prashast Srivastava, Mathias Payer
:
Gramatron: effective grammar-aware fuzzing. 244-256 - Yannic Noller
, Saeid Tizpaz-Niari
:
QFuzz: quantitative fuzzing for side channels. 257-269
Data Processing Application Analysis
- Yingjun Lyu
, Sasha Volokh
, William G. J. Halfond
, Omer Tripp
:
SAND: a static analysis approach for detecting SQL antipatterns. 270-282 - Yakun Zhang, Xiao Lv, Haoyu Dong, Wensheng Dou, Shi Han, Dongmei Zhang
, Jun Wei, Dan Ye:
Semantic table structure identification in spreadsheets. 283-295
Dynamic Analysis
- Zhe Chen, Chong Wang, Junqi Yan, Yulei Sui, Jingling Xue:
Runtime detection of memory errors with smart status. 296-308 - Binfa Gui
, Wei Song
, Jeff Huang
:
UAFSan: an object-identifier-based dynamic approach for detecting use-after-free vulnerabilities. 309-321
Symbolic Execution
- Peisen Yao
, Heqing Huang
, Wensheng Tang, Qingkai Shi
, Rongxin Wu
, Charles Zhang:
Fuzzing SMT solvers via two-dimensional input space exploration. 322-335 - Sicheng Luo, Hui Xu, Yanxiang Bi, Xin Wang, Yangfan Zhou:
Boosting symbolic execution via constraint solving time prediction (experience paper). 336-347 - Zhenbang Chen, Zehua Chen, Ziqi Shuai
, Guofeng Zhang, Weiyu Pan, Yufeng Zhang, Ji Wang:
Synthesize solving strategy for symbolic execution. 348-360 - Ziqi Shuai
, Zhenbang Chen, Yufeng Zhang, Jun Sun
, Ji Wang:
Type and interval aware array constraint solving for symbolic execution. 361-373 - Weiyu Pan, Zhenbang Chen, Guofeng Zhang, Yunlai Luo, Yufeng Zhang, Ji Wang:
Grammar-agnostic symbolic execution by token symbolization. 374-387
Machine Learning and Testing
- Clothilde Jeangoudoux, Eva Darulova
, Christoph Quirin Lauter:
Interval constraint-based mutation testing of numerical specifications. 388-399 - Xufan Zhang, Ning Sun
, Chunrong Fang
, Jiawei Liu, Jia Liu, Dong Chai, Jiang Wang, Zhenyu Chen:
Predoo: precision testing of deep learning operators. 400-412 - Saikat Dutta, Jeeva Selvam, Aryaman Jain, Sasa Misailovic:
TERA: optimizing stochastic regression tests in machine learning projects. 413-426 - Zhengran Zeng, Yuqun Zhang, Haotian Zhang, Lingming Zhang
:
Deep just-in-time defect prediction: how far are we? 427-438
Configuration and Dependency
- Suchita Mukherjee, Abigail Almanza, Cindy Rubio-González:
Fixing dependency errors for Python build reproducibility. 439-451 - Runxiang Cheng
, Lingming Zhang
, Darko Marinov
, Tianyin Xu
:
Test-case prioritization for configuration testing. 452-465 - Austin Mordahl
, Shiyi Wei:
The impact of tool configuration spaces on the evaluation of configurable taint analysis for Android. 466-477 - Wang Li, Zhouyang Jia, Shanshan Li, Yuanliang Zhang, Teng Wang, Erci Xu, Ji Wang, Xiangke Liao:
Challenges and opportunities: an in-depth empirical study on configuration error injection testing. 478-490
Testing
- Daniel Elsner, Florian Hauer, Alexander Pretschner, Silke Reimer:
Empirically evaluating readily available information for regression test optimization in continuous integration. 491-504 - Sangharatna Godboley
, Joxan Jaffar
, Rasool Maghareh
, Arpita Dutta
:
Toward optimal mc/dc test case generation. 505-516 - Salma Messaoudi
, Donghwan Shin
, Annibale Panichella
, Domenico Bianculli
, Lionel C. Briand
:
Log-based slicing for system-level test cases. 517-528 - Yishuai Li
, Benjamin C. Pierce
, Steve Zdancewic
:
Model-based testing of networked applications. 529-539 - Ashwin Kallingal Joshy
, Xueyuan Chen, Benjamin Steenhoek, Wei Le
:
Validating static warnings via testing code fragments. 540-552 - Cong Pan
, Michael Pradel
:
Continuous test suite failure prediction. 553-565 - Meng Ren, Zijing Yin
, Fuchen Ma, Zhenyang Xu, Yu Jiang
, Chengnian Sun, Huizhong Li, Yan Cai:
Empirical evaluation of smart contract testing: what is the best choice? 566-579
Binary Analysis
- Shisong Qin
, Chao Zhang, Kaixiang Chen, Zheming Li:
iDEV: exploring and exploiting semantic deviations in ARM instruction processing. 580-592 - Ming Yuan, Yeseop Lee, Chao Zhang, Yun Li, Yan Cai, Bodong Zhao:
RAProducer: efficiently diagnose and reproduce data race bugs for binaries via trace analysis. 593-606 - Han Gao
, Shaoyin Cheng
, Yinxing Xue, Weiming Zhang
:
A lightweight framework for function name reassignment based on large-scale stripped binaries. 607-619
Bugs and Analysis
- Andrew Habib
, Avraham Shinnar, Martin Hirzel, Michael Pradel
:
Finding data compatibility bugs with JSON subschema checking. 620-632 - Ridwan Shariffdeen
, Xiang Gao, Gregory J. Duck
, Shin Hwei Tan
, Julia Lawall, Abhik Roychoudhury
:
Automated patch backporting in Linux (experience paper). 633-645 - Yicheng Pan
, Meng Ma, Xinrui Jiang, Ping Wang:
Faster, deeper, easier: crowdsourcing diagnosis of microservice kernel failure from user space. 646-657
Demo Papers
- Alex Groce, Gustavo Grieco:
echidna-parade: a tool for diverse multicore smart contract fuzzing. 658-661 - Roberto Natella
, Van-Thuan Pham
:
ProFuzzBench: a benchmark for stateful protocol fuzzing. 662-665 - Meng Ren, Fuchen Ma, Zijing Yin
, Huizhong Li, Ying Fu, Ting Chen, Yu Jiang
:
SCStudio: a secure and efficient integrated development environment for smart contracts. 666-669 - Matt Windsor
, Alastair F. Donaldson
, John Wickerson
:
C4: the C compiler concurrency checker. 670-673 - Yunhan Hou, Jiawei Liu, Daiwei Wang, Jiawei He, Chunrong Fang
, Zhenyu Chen:
TauMed: test augmentation of deep learning in medical diagnosis. 674-677 - Hanlin Wei
, Behnaz Hassanshahi, Guangdong Bai
, Padmanabhan Krishnan
, Kostyantyn Vorobyov
:
MoScan: a model-based vulnerability scanner for web single sign-on services. 678-681 - Alberto Martin-Lopez
, Sergio Segura
, Antonio Ruiz-Cortés
:
RESTest: automated black-box testing of RESTful web APIs. 682-685
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.