


default search action
31st ISSTA 2022: Virtual Event, Korea
- Sukyoung Ryu, Yannis Smaragdakis:

ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022. ACM 2022, ISBN 978-1-4503-9379-9
Oracles, Models, and Measurement
- Hao Wang

, Wenjie Qu, Gilad Katz, Wenyu Zhu, Zeyu Gao, Han Qiu, Jianwei Zhuge, Chao Zhang:
jTrans: jump-aware transformer for binary code similarity detection. 1-13 - Gabin An, Shin Yoo:

FDG: a precise measurement of fault diagnosability gain of test cases. 14-26 - Jiahao Liu

, Jun Zeng, Xiang Wang, Kaihang Ji, Zhenkai Liang:
TeLL: log level suggestions via modeling multi-level code block information. 27-38 - Zhengran Zeng, Hanzhuo Tan, Haotian Zhang, Jing Li

, Yuqun Zhang, Lingming Zhang:
An extensive study on pre-trained models for program understanding and generation. 39-51 - Hasan Ferit Eniser, Timo P. Gros, Valentin Wüstholz, Jörg Hoffmann, Maria Christakis:

Metamorphic relations via relaxations: an approach to obtain oracles for action-policy testing. 52-63 - Xiaohui Zhang, Yuanjun Gong

, Bin Liang, Jianjun Huang
, Wei You, Wenchang Shi, Jian Zhang:
Hunting bugs with accelerated optimal graph vertex matching. 64-76 - Jialu Zhang, Todd Mytkowicz, Mike Kaufman, Ruzica Piskac

, Shuvendu K. Lahiri:
Using pre-trained language models to resolve textual and semantic merge conflicts (experience paper). 77-88 - Clay Stevens

, Hamid Bagheri:
Combining solution reuse and bound tightening for efficient analysis of evolving systems. 89-100 - Rebecca Moussa, Federica Sarro

:
On the use of evaluation measures for defect prediction studies. 101-113 - Chengpeng Li, August Shi:

Evolution-aware detection of order-dependent flaky tests. 114-125
Neural Networks, Learning, NLP
- Pei Huang, Yuting Yang, Minghao Liu

, Fuqi Jia
, Feifei Ma, Jian Zhang:
ε-weakened robustness of deep neural networks. 126-138 - Michael Weiss

, Paolo Tonella:
Simple techniques work surprisingly well for neural network test prioritization and active learning (replicability study). 139-150 - Geunwoo Kim, Sanghyun Hong, Michael Franz, Dokyung Song

:
Improving cross-platform binary analysis using representation learning via graph alignment. 151-163 - Jialai Wang, Han Qiu, Yi Rong, Hengkai Ye, Qi Li, Zongpeng Li, Chao Zhang:

BET: black-box efficient testing for convolutional neural networks. 164-175 - Danning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan, Xiangyu Zhang, Michael W. Godfrey:

DocTer: documentation-guided fuzzing for testing deep learning API functions. 176-188 - Pin Ji, Yang Feng, Jia Liu, Zhihong Zhao, Zhenyu Chen:

ASRTest: automated testing for deep-neural-network-driven speech recognition systems. 189-201 - Jen-tse Huang

, Jianping Zhang, Wenxuan Wang, Pinjia He, Yuxin Su, Michael R. Lyu:
AEON: a method for automatic evaluation of NLP test cases. 202-214 - Charaka Geethal Kapugama, Van-Thuan Pham, Aldeida Aleti, Marcel Böhme:

Human-in-the-loop oracle learning for semantic bugs in string processing programs. 215-226 - Yu Li, Muxi Chen, Qiang Xu

:
HybridRepair: towards annotation-efficient repair for deep learning models. 227-238 - Zhiming Li, Xiaofei Xie

, Haoliang Li
, Zhengzi Xu, Yi Li, Yang Liu
:
Cross-lingual transfer learning for statistical type inference. 239-250
Test Generation and Mutation
- Zhiyong Wu, Jie Liang, Mingzhe Wang, Chijin Zhou

, Yu Jiang:
Unicorn: detect runtime errors in time-series databases with hybrid input synthesis. 251-262 - James Perretta, Andrew DeOrio, Arjun Guha

, Jonathan Bell:
On the use of mutation analysis for evaluating student test suite quality. 263-275 - Hong Jin Kang

, Truong Giang Nguyen, Bach Le, Corina S. Pasareanu, David Lo
:
Test mimicry to assess the exploitability of library vulnerabilities. 276-288 - Myeongsoo Kim, Qi Xin, Saurabh Sinha, Alessandro Orso:

Automated test generation for REST APIs: no time to rest yet. 289-301 - Yingying Zheng

, Wensheng Dou, Yicheng Wang
, Zheng Qin, Lei Tang, Yu Gao, Dong Wang
, Wei Wang, Jun Wei:
Finding bugs in Gremlin-based graph database systems via Randomized differential testing. 302-313 - Xuezhi Song, Yun Lin, Siang Hwee Ng, Yijian Wu, Xin Peng, Jin Song Dong, Hong Mei:

RegMiner: towards constructing a large regression dataset from code evolution history. 314-326 - Ming Fan, Jiali Wei, Wuxia Jin, Zhou Xu, Wenying Wei, Ting Liu:

One step further: evaluating interpreters using metamorphic testing. 327-339
Fuzzing and Friends
- Anastasios Andronidis, Cristian Cadar:

SnapFuzz: high-throughput fuzzing of network applications. 340-351 - Sumit Lahiri

, Subhajit Roy:
Almost correct invariants: synthesizing inductive invariants by fuzzing proofs. 352-364 - Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, Raheem Beyah:

SLIME: program-sensitive energy allocation for fuzzing. 365-377 - Qi Pang, Yuanyuan Yuan, Shuai Wang:

MDPFuzz: testing models solving Markov decision processes. 378-390 - Xuwei Liu, Wei You, Zhuo Zhang

, Xiangyu Zhang:
TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving. 391-403 - Zheyu Ma

, Bodong Zhao, Letu Ren, Zheming Li, Siqi Ma
, Xiapu Luo, Chao Zhang:
PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation. 404-416 - Yaowen Zheng, Yuekang Li

, Cen Zhang, Hongsong Zhu, Yang Liu
, Limin Sun:
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation. 417-428
Concurrency, IoT, Embedded
- Tao Wang, Kangkang Zhang, Wei Chen, Wensheng Dou, Jiaxin Zhu, Jun Wei, Tao Huang:

Understanding device integration bugs in smart home system. 429-441 - Binbin Zhao, Shouling Ji, Jiacheng Xu

, Yuan Tian, Qiuyang Wei
, Qinying Wang
, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware. 442-454 - Jinpeng Zhou, Hanmei Yang, John Lange, Tongping Liu:

Deadlock prediction via generalized dependency. 455-466 - Boxi Yu, Zhiqing Zhong

, Xinran Qin, Jiayi Yao, Yuancheng Wang, Pinjia He:
Automated testing of image captioning systems. 467-479 - An Guo

, Yang Feng, Zhenyu Chen:
LiRTest: augmenting LiDAR point clouds for automated testing of autonomous driving systems. 480-492 - Ziyuan Zhong, Zhisheng Hu, Shengjian Guo, Xinyang Zhang

, Zhenyu Zhong, Baishakhi Ray:
Detecting multi-sensor fusion errors in advanced driver-assistance systems. 493-505 - Chao Li, Rui Chen, Boxiang Wang, Tingting Yu, Dongdong Gao, Mengfei Yang:

Precise and efficient atomicity violation detection for interrupt-driven programs via staged path pruning. 506-518
Static Analysis and Specifications Testing
- Xiao Cheng

, Guanqin Zhang, Haoyu Wang, Yulei Sui:
Path-sensitive code embedding via contrastive learning for software vulnerability detection. 519-531 - Marcus Nachtigall, Michael Schlichtig

, Eric Bodden:
A large-scale study of usability criteria addressed by static analysis tools. 532-543 - Stephan Lipp, Sebastian Banescu, Alexander Pretschner:

An empirical study on the effectiveness of static C code analyzers for vulnerability detection. 544-555 - Ahmed Irfan

, Sorawee Porncharoenwase, Zvonimir Rakamaric, Neha Rungta, Emina Torlak:
Testing Dafny (experience paper). 556-567 - Frank Busse

, Pritam M. Gharat
, Cristian Cadar
, Alastair F. Donaldson:
Combining static analysis error traces with dynamic symbolic execution (experience paper). 568-579 - Ingkarat Rak-amnouykit, Ana L. Milanova, Guillaume Baudart, Martin Hirzel, Julian Dolby:

The raise of machine learning hyperparameter constraints in Python code. 580-592
Android
- Shuaihao Yang, Zigang Zeng, Wei Song:

PermDroid: automatically testing permission-related behaviour of Android applications. 593-604 - Wunan Guo, Zhen Dong, Liwei Shen, Wei Tian, Ting Su, Xin Peng:

Detecting and fixing data loss issues in Android apps. 605-616 - Pei Liu, Yanjie Zhao

, Haipeng Cai
, Mattia Fazzini
, John C. Grundy, Li Li:
Automatically detecting API-induced compatibility issues in Android apps: a comparative analysis (replicability study). 617-628 - Hao Zhou

, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai
:
NCScope: hardware-assisted analyzer for native code in Android apps. 629-641 - Yifei Lu, Minxue Pan, Yu Pei, Xuandong Li:

Detecting resource utilization bugs induced by variant lifecycles in Android. 642-653
Program Repair
- Ali Ghanbari

, Andrian Marcus:
Patch correctness assessment in automated program repair based on the impact of patches on production and test code. 654-665 - Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Nazareno Aguirre, Marcelo F. Frias

, Hamid Bagheri:
ATR: template-based repair for Alloy specifications. 666-677 - Wei Yuan, Quanjun Zhang

, Tieke He, Chunrong Fang, Nguyen Quoc Viet Hung, Xiaodong Hao, Hongzhi Yin
:
CIRCLE: continual repair across programming languages. 678-690 - Yuntong Zhang

, Xiang Gao, Gregory J. Duck, Abhik Roychoudhury:
Program vulnerability repair via inductive inference. 691-702
Smart Contracts
- Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai

, Lei Wu:
WASAI: uncovering vulnerabilities in Wasm smart contracts. 703-715 - Ye Liu, Yi Li, Shang-Wei Lin, Cyrille Artho:

Finding permission bugs in smart contracts with role mining. 716-727 - Asem Ghaleb

, Julia Rubin, Karthik Pattabiraman:
eTainter: detecting gas-related vulnerabilities in smart contracts. 728-739 - Peilin Zheng, Zibin Zheng, Xiapu Luo:

Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution. 740-751 - Zeqin Liao

, Zibin Zheng, Xiao Chen, Yuhong Nan:
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability. 752-764
Tool Demos
- Chanh Duc Ngo, Fabrizio Pastore

, Lionel C. Briand:
ATUA: an update-driven app testing tool. 765-768 - Franz Brauße, Fedor Shmarov, Rafael Menezes

, Mikhail R. Gadelha, Konstantin Korovin, Giles Reger, Lucas C. Cordeiro:
ESBMC-CHERI: towards verification of C programs for CHERI platforms with ESBMC. 773-776 - Rafael Menezes

, Daniel Moura, Helena Cavalcante, Rosiane de Freitas, Lucas C. Cordeiro:
ESBMC-Jimple: verifying Kotlin programs via jimple intermediate representation. 777-780 - Ali Ghanbari, Andrian Marcus:

Faster mutation analysis with MeMu. 781-784 - Wunan Guo, Zhen Dong, Liwei Shen, Wei Tian, Ting Su, Xin Peng:

iFixDataloss: a tool for detecting and fixing data loss issues in Android apps. 785-788 - Eduard Pinconschi, Quang-Cuong Bui

, Rui Abreu
, Pedro Adão
, Riccardo Scandariato:
Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities. 789-792 - Alexandru Bodea:

Pytest-Smell: a smell detection tool for Python unit tests. 793-796 - Daniel Fortunato

, José Campos
, Rui Abreu
:
QMutPy: a mutation testing tool for Quantum algorithms and applications in Qiskit. 797-800 - Boxiang Wang, Rui Chen, Chao Li, Tingting Yu, Dongdong Gao, Mengfei Yang:

SpecChecker-ISA: a data sharing analyzer for interrupt-driven embedded software. 801-804 - Ziqian Zhang, Yulei Liu, Shengcheng Yu, Xin Li, Yexiao Yun, Chunrong Fang, Zhenyu Chen:

UniRLTest: universal platform-independent testing with reinforcement learning via image understanding. 805-808

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














