


default search action
30th ISSTA 2021: Virtual Event, Denmark
- Cristian Cadar, Xiangyu Zhang:

ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021. ACM 2021, ISBN 978-1-4503-8459-9
Invited Presentation
- Chris Parnin, Alessandro Orso:

Automated debugging: past, present, and future (ISSTA impact paper award). 1
Web Applications
- Kulani Mahadewa

, Yanjun Zhang, Guangdong Bai
, Lei Bu
, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong:
Identifying privacy weaknesses from multi-party trigger-action integration platforms. 2-15 - Fei Shao, Rui Xu, Wasif Arman Haque, Jingwei Xu, Ying Zhang, Wei Yang

, Yanfang Ye, Xusheng Xiao
:
WebEvo: taming web application evolution via detecting semantic structure changes. 16-28 - Benjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller

:
Modular call graph construction for security scanning of Node.js applications. 29-41
Testing Deep Learning Systems
- Zhe Zhao

, Guangke Chen
, Jingyi Wang, Yiwei Yang
, Fu Song, Jun Sun
:
Attack as defense: characterizing adversarial examples using robustness. 42-55 - Isaac Dunn

, Hadrien Pouget
, Daniel Kroening
, Tom Melham
:
Exposing previously undetectable faults in deep neural networks. 56-66 - Nargiz Humbatova

, Gunel Jahangirova
, Paolo Tonella
:
DeepCrime: mutation testing of deep learning systems based on real faults. 67-78 - Tahereh Zohdinasab

, Vincenzo Riccio
, Alessio Gambi, Paolo Tonella
:
DeepHyperion: exploring the feature space of deep learning-based systems through illumination search. 79-90 - Fitash Ul Haq

, Donghwan Shin
, Lionel C. Briand
, Thomas Stifter, Jun Wang
:
Automatic test suite generation for key-points detection DNNs using many-objective search (experience paper). 91-102 - Lingfeng Zhang

, Yueling Zhang
, Min Zhang
:
Efficient white-box fairness testing through gradient search. 103-114 - Zixi Liu, Yang Feng, Zhenyu Chen:

DialTest: automated testing for recurrent-neural-network-driven dialogue systems. 115-126 - Quan Zhang

, Yifeng Ding
, Yongqiang Tian
, Jianmin Guo, Min Yuan, Yu Jiang
:
AdvDoor: adversarial backdoor attack of deep learning system. 127-138 - Yuanchun Li, Ziqi Zhang, Bingyan Liu, Ziyue Yang, Yunxin Liu:

ModelDiff: testing-based DNN similarity comparison for model reuse detection. 139-151
Android Application Analysis and Testing
- Lei Xue, Yuxiao Yan, Luyi Yan

, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou:
Parema: an unpacking framework for demystifying VM-based Android packers. 152-164 - Wenyu Wang

, Wing Lam, Tao Xie
:
An infrastructure approach to improving effectiveness of Android UI testing tools. 165-176 - Leonardo Mariani

, Ali Mohebbi
, Mauro Pezzè
, Valerio Terragni
:
Semantic matching of GUI events for test reuse: are we there yet? 177-190 - Tongtong Xu, Minxue Pan

, Yu Pei
, Guiyin Li, Xia Zeng, Tian Zhang, Yuetang Deng, Xuandong Li:
GUIDER: GUI structure and vision co-guided test script repair for Android apps. 191-203 - Jingling Sun

, Ting Su
, Junxin Li
, Zhen Dong, Geguang Pu, Tao Xie
, Zhendong Su:
Understanding and finding system setting-related defects in Android apps. 204-215 - Yueming Wu

, Deqing Zou, Wei Yang
, Xiang Li, Hai Jin:
HomDroid: detecting Android covert malware by social-network homophily analysis. 216-229
Fuzzing
- Adrian Herrera

, Hendra Gunadi, Shane Magrath, Michael Norrish
, Mathias Payer
, Antony L. Hosking
:
Seed selection for successful fuzzing. 230-243 - Prashast Srivastava, Mathias Payer

:
Gramatron: effective grammar-aware fuzzing. 244-256 - Yannic Noller

, Saeid Tizpaz-Niari
:
QFuzz: quantitative fuzzing for side channels. 257-269
Data Processing Application Analysis
- Yingjun Lyu

, Sasha Volokh
, William G. J. Halfond
, Omer Tripp
:
SAND: a static analysis approach for detecting SQL antipatterns. 270-282 - Yakun Zhang, Xiao Lv, Haoyu Dong, Wensheng Dou, Shi Han, Dongmei Zhang

, Jun Wei, Dan Ye:
Semantic table structure identification in spreadsheets. 283-295
Dynamic Analysis
- Zhe Chen, Chong Wang, Junqi Yan, Yulei Sui, Jingling Xue:

Runtime detection of memory errors with smart status. 296-308 - Binfa Gui

, Wei Song
, Jeff Huang
:
UAFSan: an object-identifier-based dynamic approach for detecting use-after-free vulnerabilities. 309-321
Symbolic Execution
- Peisen Yao

, Heqing Huang
, Wensheng Tang, Qingkai Shi
, Rongxin Wu
, Charles Zhang:
Fuzzing SMT solvers via two-dimensional input space exploration. 322-335 - Sicheng Luo, Hui Xu, Yanxiang Bi, Xin Wang, Yangfan Zhou:

Boosting symbolic execution via constraint solving time prediction (experience paper). 336-347 - Zhenbang Chen, Zehua Chen, Ziqi Shuai

, Guofeng Zhang, Weiyu Pan, Yufeng Zhang, Ji Wang:
Synthesize solving strategy for symbolic execution. 348-360 - Ziqi Shuai

, Zhenbang Chen, Yufeng Zhang, Jun Sun
, Ji Wang:
Type and interval aware array constraint solving for symbolic execution. 361-373 - Weiyu Pan, Zhenbang Chen, Guofeng Zhang, Yunlai Luo, Yufeng Zhang, Ji Wang:

Grammar-agnostic symbolic execution by token symbolization. 374-387
Machine Learning and Testing
- Clothilde Jeangoudoux, Eva Darulova

, Christoph Quirin Lauter:
Interval constraint-based mutation testing of numerical specifications. 388-399 - Xufan Zhang, Ning Sun

, Chunrong Fang
, Jiawei Liu, Jia Liu, Dong Chai, Jiang Wang, Zhenyu Chen:
Predoo: precision testing of deep learning operators. 400-412 - Saikat Dutta, Jeeva Selvam, Aryaman Jain, Sasa Misailovic:

TERA: optimizing stochastic regression tests in machine learning projects. 413-426 - Zhengran Zeng, Yuqun Zhang, Haotian Zhang, Lingming Zhang

:
Deep just-in-time defect prediction: how far are we? 427-438
Configuration and Dependency
- Suchita Mukherjee, Abigail Almanza, Cindy Rubio-González:

Fixing dependency errors for Python build reproducibility. 439-451 - Runxiang Cheng

, Lingming Zhang
, Darko Marinov
, Tianyin Xu
:
Test-case prioritization for configuration testing. 452-465 - Austin Mordahl

, Shiyi Wei:
The impact of tool configuration spaces on the evaluation of configurable taint analysis for Android. 466-477 - Wang Li, Zhouyang Jia, Shanshan Li, Yuanliang Zhang, Teng Wang, Erci Xu, Ji Wang, Xiangke Liao:

Challenges and opportunities: an in-depth empirical study on configuration error injection testing. 478-490
Testing
- Daniel Elsner, Florian Hauer, Alexander Pretschner, Silke Reimer:

Empirically evaluating readily available information for regression test optimization in continuous integration. 491-504 - Sangharatna Godboley

, Joxan Jaffar
, Rasool Maghareh
, Arpita Dutta
:
Toward optimal mc/dc test case generation. 505-516 - Salma Messaoudi

, Donghwan Shin
, Annibale Panichella
, Domenico Bianculli
, Lionel C. Briand
:
Log-based slicing for system-level test cases. 517-528 - Yishuai Li

, Benjamin C. Pierce
, Steve Zdancewic
:
Model-based testing of networked applications. 529-539 - Ashwin Kallingal Joshy

, Xueyuan Chen, Benjamin Steenhoek, Wei Le
:
Validating static warnings via testing code fragments. 540-552 - Cong Pan

, Michael Pradel
:
Continuous test suite failure prediction. 553-565 - Meng Ren, Zijing Yin

, Fuchen Ma, Zhenyang Xu, Yu Jiang
, Chengnian Sun, Huizhong Li, Yan Cai
:
Empirical evaluation of smart contract testing: what is the best choice? 566-579
Binary Analysis
- Shisong Qin

, Chao Zhang, Kaixiang Chen, Zheming Li:
iDEV: exploring and exploiting semantic deviations in ARM instruction processing. 580-592 - Ming Yuan, Yeseop Lee, Chao Zhang, Yun Li, Yan Cai

, Bodong Zhao:
RAProducer: efficiently diagnose and reproduce data race bugs for binaries via trace analysis. 593-606 - Han Gao

, Shaoyin Cheng
, Yinxing Xue, Weiming Zhang
:
A lightweight framework for function name reassignment based on large-scale stripped binaries. 607-619
Bugs and Analysis
- Andrew Habib

, Avraham Shinnar, Martin Hirzel, Michael Pradel
:
Finding data compatibility bugs with JSON subschema checking. 620-632 - Ridwan Shariffdeen

, Xiang Gao, Gregory J. Duck
, Shin Hwei Tan
, Julia Lawall, Abhik Roychoudhury
:
Automated patch backporting in Linux (experience paper). 633-645 - Yicheng Pan

, Meng Ma, Xinrui Jiang, Ping Wang:
Faster, deeper, easier: crowdsourcing diagnosis of microservice kernel failure from user space. 646-657
Demo Papers
- Alex Groce, Gustavo Grieco:

echidna-parade: a tool for diverse multicore smart contract fuzzing. 658-661 - Roberto Natella

, Van-Thuan Pham
:
ProFuzzBench: a benchmark for stateful protocol fuzzing. 662-665 - Meng Ren, Fuchen Ma, Zijing Yin

, Huizhong Li, Ying Fu, Ting Chen, Yu Jiang
:
SCStudio: a secure and efficient integrated development environment for smart contracts. 666-669 - Matt Windsor

, Alastair F. Donaldson
, John Wickerson
:
C4: the C compiler concurrency checker. 670-673 - Yunhan Hou, Jiawei Liu, Daiwei Wang, Jiawei He, Chunrong Fang

, Zhenyu Chen:
TauMed: test augmentation of deep learning in medical diagnosis. 674-677 - Hanlin Wei

, Behnaz Hassanshahi, Guangdong Bai
, Padmanabhan Krishnan
, Kostyantyn Vorobyov
:
MoScan: a model-based vulnerability scanner for web single sign-on services. 678-681 - Alberto Martin-Lopez

, Sergio Segura
, Antonio Ruiz-Cortés
:
RESTest: automated black-box testing of RESTful web APIs. 682-685

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














