default search action
31st ISSTA 2022: Virtual Event, Korea
- Sukyoung Ryu, Yannis Smaragdakis:
ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022. ACM 2022, ISBN 978-1-4503-9379-9
Oracles, Models, and Measurement
- Hao Wang, Wenjie Qu, Gilad Katz, Wenyu Zhu, Zeyu Gao, Han Qiu, Jianwei Zhuge, Chao Zhang:
jTrans: jump-aware transformer for binary code similarity detection. 1-13 - Gabin An, Shin Yoo:
FDG: a precise measurement of fault diagnosability gain of test cases. 14-26 - Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, Zhenkai Liang:
TeLL: log level suggestions via modeling multi-level code block information. 27-38 - Zhengran Zeng, Hanzhuo Tan, Haotian Zhang, Jing Li, Yuqun Zhang, Lingming Zhang:
An extensive study on pre-trained models for program understanding and generation. 39-51 - Hasan Ferit Eniser, Timo P. Gros, Valentin Wüstholz, Jörg Hoffmann, Maria Christakis:
Metamorphic relations via relaxations: an approach to obtain oracles for action-policy testing. 52-63 - Xiaohui Zhang, Yuanjun Gong, Bin Liang, Jianjun Huang, Wei You, Wenchang Shi, Jian Zhang:
Hunting bugs with accelerated optimal graph vertex matching. 64-76 - Jialu Zhang, Todd Mytkowicz, Mike Kaufman, Ruzica Piskac, Shuvendu K. Lahiri:
Using pre-trained language models to resolve textual and semantic merge conflicts (experience paper). 77-88 - Clay Stevens, Hamid Bagheri:
Combining solution reuse and bound tightening for efficient analysis of evolving systems. 89-100 - Rebecca Moussa, Federica Sarro:
On the use of evaluation measures for defect prediction studies. 101-113 - Chengpeng Li, August Shi:
Evolution-aware detection of order-dependent flaky tests. 114-125
Neural Networks, Learning, NLP
- Pei Huang, Yuting Yang, Minghao Liu, Fuqi Jia, Feifei Ma, Jian Zhang:
ε-weakened robustness of deep neural networks. 126-138 - Michael Weiss, Paolo Tonella:
Simple techniques work surprisingly well for neural network test prioritization and active learning (replicability study). 139-150 - Geunwoo Kim, Sanghyun Hong, Michael Franz, Dokyung Song:
Improving cross-platform binary analysis using representation learning via graph alignment. 151-163 - Jialai Wang, Han Qiu, Yi Rong, Hengkai Ye, Qi Li, Zongpeng Li, Chao Zhang:
BET: black-box efficient testing for convolutional neural networks. 164-175 - Danning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan, Xiangyu Zhang, Michael W. Godfrey:
DocTer: documentation-guided fuzzing for testing deep learning API functions. 176-188 - Pin Ji, Yang Feng, Jia Liu, Zhihong Zhao, Zhenyu Chen:
ASRTest: automated testing for deep-neural-network-driven speech recognition systems. 189-201 - Jen-tse Huang, Jianping Zhang, Wenxuan Wang, Pinjia He, Yuxin Su, Michael R. Lyu:
AEON: a method for automatic evaluation of NLP test cases. 202-214 - Charaka Geethal Kapugama, Van-Thuan Pham, Aldeida Aleti, Marcel Böhme:
Human-in-the-loop oracle learning for semantic bugs in string processing programs. 215-226 - Yu Li, Muxi Chen, Qiang Xu:
HybridRepair: towards annotation-efficient repair for deep learning models. 227-238 - Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu:
Cross-lingual transfer learning for statistical type inference. 239-250
Test Generation and Mutation
- Zhiyong Wu, Jie Liang, Mingzhe Wang, Chijin Zhou, Yu Jiang:
Unicorn: detect runtime errors in time-series databases with hybrid input synthesis. 251-262 - James Perretta, Andrew DeOrio, Arjun Guha, Jonathan Bell:
On the use of mutation analysis for evaluating student test suite quality. 263-275 - Hong Jin Kang, Truong Giang Nguyen, Bach Le, Corina S. Pasareanu, David Lo:
Test mimicry to assess the exploitability of library vulnerabilities. 276-288 - Myeongsoo Kim, Qi Xin, Saurabh Sinha, Alessandro Orso:
Automated test generation for REST APIs: no time to rest yet. 289-301 - Yingying Zheng, Wensheng Dou, Yicheng Wang, Zheng Qin, Lei Tang, Yu Gao, Dong Wang, Wei Wang, Jun Wei:
Finding bugs in Gremlin-based graph database systems via Randomized differential testing. 302-313 - Xuezhi Song, Yun Lin, Siang Hwee Ng, Yijian Wu, Xin Peng, Jin Song Dong, Hong Mei:
RegMiner: towards constructing a large regression dataset from code evolution history. 314-326 - Ming Fan, Jiali Wei, Wuxia Jin, Zhou Xu, Wenying Wei, Ting Liu:
One step further: evaluating interpreters using metamorphic testing. 327-339
Fuzzing and Friends
- Anastasios Andronidis, Cristian Cadar:
SnapFuzz: high-throughput fuzzing of network applications. 340-351 - Sumit Lahiri, Subhajit Roy:
Almost correct invariants: synthesizing inductive invariants by fuzzing proofs. 352-364 - Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, Raheem Beyah:
SLIME: program-sensitive energy allocation for fuzzing. 365-377 - Qi Pang, Yuanyuan Yuan, Shuai Wang:
MDPFuzz: testing models solving Markov decision processes. 378-390 - Xuwei Liu, Wei You, Zhuo Zhang, Xiangyu Zhang:
TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving. 391-403 - Zheyu Ma, Bodong Zhao, Letu Ren, Zheming Li, Siqi Ma, Xiapu Luo, Chao Zhang:
PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation. 404-416 - Yaowen Zheng, Yuekang Li, Cen Zhang, Hongsong Zhu, Yang Liu, Limin Sun:
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation. 417-428
Concurrency, IoT, Embedded
- Tao Wang, Kangkang Zhang, Wei Chen, Wensheng Dou, Jiaxin Zhu, Jun Wei, Tao Huang:
Understanding device integration bugs in smart home system. 429-441 - Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware. 442-454 - Jinpeng Zhou, Hanmei Yang, John Lange, Tongping Liu:
Deadlock prediction via generalized dependency. 455-466 - Boxi Yu, Zhiqing Zhong, Xinran Qin, Jiayi Yao, Yuancheng Wang, Pinjia He:
Automated testing of image captioning systems. 467-479 - An Guo, Yang Feng, Zhenyu Chen:
LiRTest: augmenting LiDAR point clouds for automated testing of autonomous driving systems. 480-492 - Ziyuan Zhong, Zhisheng Hu, Shengjian Guo, Xinyang Zhang, Zhenyu Zhong, Baishakhi Ray:
Detecting multi-sensor fusion errors in advanced driver-assistance systems. 493-505 - Chao Li, Rui Chen, Boxiang Wang, Tingting Yu, Dongdong Gao, Mengfei Yang:
Precise and efficient atomicity violation detection for interrupt-driven programs via staged path pruning. 506-518
Static Analysis and Specifications Testing
- Xiao Cheng, Guanqin Zhang, Haoyu Wang, Yulei Sui:
Path-sensitive code embedding via contrastive learning for software vulnerability detection. 519-531 - Marcus Nachtigall, Michael Schlichtig, Eric Bodden:
A large-scale study of usability criteria addressed by static analysis tools. 532-543 - Stephan Lipp, Sebastian Banescu, Alexander Pretschner:
An empirical study on the effectiveness of static C code analyzers for vulnerability detection. 544-555 - Ahmed Irfan, Sorawee Porncharoenwase, Zvonimir Rakamaric, Neha Rungta, Emina Torlak:
Testing Dafny (experience paper). 556-567 - Frank Busse, Pritam M. Gharat, Cristian Cadar, Alastair F. Donaldson:
Combining static analysis error traces with dynamic symbolic execution (experience paper). 568-579 - Ingkarat Rak-amnouykit, Ana L. Milanova, Guillaume Baudart, Martin Hirzel, Julian Dolby:
The raise of machine learning hyperparameter constraints in Python code. 580-592
Android
- Shuaihao Yang, Zigang Zeng, Wei Song:
PermDroid: automatically testing permission-related behaviour of Android applications. 593-604 - Wunan Guo, Zhen Dong, Liwei Shen, Wei Tian, Ting Su, Xin Peng:
Detecting and fixing data loss issues in Android apps. 605-616 - Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John C. Grundy, Li Li:
Automatically detecting API-induced compatibility issues in Android apps: a comparative analysis (replicability study). 617-628 - Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai:
NCScope: hardware-assisted analyzer for native code in Android apps. 629-641 - Yifei Lu, Minxue Pan, Yu Pei, Xuandong Li:
Detecting resource utilization bugs induced by variant lifecycles in Android. 642-653
Program Repair
- Ali Ghanbari, Andrian Marcus:
Patch correctness assessment in automated program repair based on the impact of patches on production and test code. 654-665 - Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Nazareno Aguirre, Marcelo F. Frias, Hamid Bagheri:
ATR: template-based repair for Alloy specifications. 666-677 - Wei Yuan, Quanjun Zhang, Tieke He, Chunrong Fang, Nguyen Quoc Viet Hung, Xiaodong Hao, Hongzhi Yin:
CIRCLE: continual repair across programming languages. 678-690 - Yuntong Zhang, Xiang Gao, Gregory J. Duck, Abhik Roychoudhury:
Program vulnerability repair via inductive inference. 691-702
Smart Contracts
- Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
WASAI: uncovering vulnerabilities in Wasm smart contracts. 703-715 - Ye Liu, Yi Li, Shang-Wei Lin, Cyrille Artho:
Finding permission bugs in smart contracts with role mining. 716-727 - Asem Ghaleb, Julia Rubin, Karthik Pattabiraman:
eTainter: detecting gas-related vulnerabilities in smart contracts. 728-739 - Peilin Zheng, Zibin Zheng, Xiapu Luo:
Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution. 740-751 - Zeqin Liao, Zibin Zheng, Xiao Chen, Yuhong Nan:
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability. 752-764
Tool Demos
- Chanh Duc Ngo, Fabrizio Pastore, Lionel C. Briand:
ATUA: an update-driven app testing tool. 765-768 - Franz Brauße, Fedor Shmarov, Rafael Menezes, Mikhail R. Gadelha, Konstantin Korovin, Giles Reger, Lucas C. Cordeiro:
ESBMC-CHERI: towards verification of C programs for CHERI platforms with ESBMC. 773-776 - Rafael Menezes, Daniel Moura, Helena Cavalcante, Rosiane de Freitas, Lucas C. Cordeiro:
ESBMC-Jimple: verifying Kotlin programs via jimple intermediate representation. 777-780 - Ali Ghanbari, Andrian Marcus:
Faster mutation analysis with MeMu. 781-784 - Wunan Guo, Zhen Dong, Liwei Shen, Wei Tian, Ting Su, Xin Peng:
iFixDataloss: a tool for detecting and fixing data loss issues in Android apps. 785-788 - Eduard Pinconschi, Quang-Cuong Bui, Rui Abreu, Pedro Adão, Riccardo Scandariato:
Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities. 789-792 - Alexandru Bodea:
Pytest-Smell: a smell detection tool for Python unit tests. 793-796 - Daniel Fortunato, José Campos, Rui Abreu:
QMutPy: a mutation testing tool for Quantum algorithms and applications in Qiskit. 797-800 - Boxiang Wang, Rui Chen, Chao Li, Tingting Yu, Dongdong Gao, Mengfei Yang:
SpecChecker-ISA: a data sharing analyzer for interrupt-driven embedded software. 801-804 - Ziqian Zhang, Yulei Liu, Shengcheng Yu, Xin Li, Yexiao Yun, Chunrong Fang, Zhenyu Chen:
UniRLTest: universal platform-independent testing with reinforcement learning via image understanding. 805-808
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.