Abstract is missing.
- Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service CustomizationsAntonio Ken Iannillo, Roberto Natella, Domenico Cotroneo, Cristina Nita-Rotaru. 1-11 [doi]
- Reflection Analysis for Java: Uncovering More Reflective Targets PreciselyJie Liu, Yue Li, Tian Tan, Jingling Xue. 12-23 [doi]
- GEMS: An Extract Method Refactoring RecommenderSihan Xu, Aishwarya Sivaraman, Siau-Cheng Khoo, Jing Xu. 24-34 [doi]
- A Generalized Bivariate Modeling Framework of Fault Detection and Correction ProcessesHiroyuki Okamura, Tadashi Dohi. 35-45 [doi]
- A Stochastic Modeling Approach for an Efficient Dependability Evaluation of Large Systems with Non-anonymous Interconnected ComponentsGiulio Masetti, Silvano Chiaradonna, Felicita Di Giandomenico. 46-55 [doi]
- Understanding the Impacts of Influencing Factors on Time to a DataRace Software FailureKun Qiu, Zheng Zheng, Kishor S. Trivedi, Bei-Bei Yin. 56-66 [doi]
- An Exploratory Study of Field FailuresLuca Gazzola, Leonardo Mariani, Fabrizio Pastore, Mauro Pezzè. 67-77 [doi]
- Learning from Imbalanced Data for Predicting the Number of Software DefectsXiao Yu, Jin Liu, Zijiang Yang, Xiangyang Jia, Qi Ling, Sizhe Ye. 78-89 [doi]
- A Fault Correlation Approach to Detect Performance Anomalies in Virtual Network Function ChainsDomenico Cotroneo, Roberto Natella, Stefano Rosiello. 90-100 [doi]
- Experience Report: Fault Triggers in Linux Operating System: from Evolution PerspectiveGuanping Xiao, Zheng Zheng, Beibei Yin, Kishor S. Trivedi, Xiaoting Du, Kaiyuan Cai. 101-111 [doi]
- Simultaneous Fault Models for the Generation of Efficient Error Detection MechanismsMatthew Leeke. 112-123 [doi]
- Which Packages Would be Affected by This Bug Report?Qiao Huang, David Lo, Xin Xia, Qingye Wang, Shanping Li. 124-135 [doi]
- Experience Report: On the Impact of Software Faults in the Privileged Virtual MachineFrederico Cerveira, Raul Barbosa, Henrique Madeira. 136-145 [doi]
- WAP: SAT-Based Computation of Minimal Cut SetsWeilin Luo, Ou Wei. 146-151 [doi]
- Experience Report: Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug ReportsKaterina Goseva-Popstojanova, Jacob Tyo. 152-163 [doi]
- WAP: Does Reviewer Age Affect Code Review Performance?Yukasa Murakami, Masateru Tsunoda, Hidetake Uwano. 164-169 [doi]
- Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case StudyAlexandre Melo Braga, Ricardo Dahab, Nuno Antunes, Nuno Laranjeiro, Marco Vieira. 170-181 [doi]
- Interactive Runtime Verification - When Interactive Debugging Meets Runtime VerificationRaphaël Jakse, Yliès Falcone, Jean-François Méhaut, Kevin Pouget. 182-193 [doi]
- Formal Development of Policing Functions for Intelligent SystemsChris Bogdiukiewicz, Michael J. Butler, Thai Son Hoang, Martin Paxton, James Snook, Xanthippe Waldron, Toby Wilkinson. 194-204 [doi]
- Experience Report: Study of Vulnerabilities of Enterprise Operating SystemsAnatoliy Gorbenko, Alexander Romanovsky, Olga Tarasyuk, Oleksandr Biloborodov. 205-215 [doi]
- Software Metrics as Indicators of Security VulnerabilitiesNadia Patricia Da Silva Medeiros, Naghmeh Ivaki, Pedro Costa 0002, Marco Vieira. 216-227 [doi]
- Models of Reliability of Fault-Tolerant Software Under Cyber-AttacksPeter Popov. 228-239 [doi]
- Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court CaseAad P. A. van Moorsel, Matthew Forshaw, Francisco Rocha. 240-249 [doi]
- Perman: Fine-Grained Permission Management for Android ApplicationsJiaojiao Fu, Yangfan Zhou, Huan Liu, Yu Kang, Xin Wang. 250-259 [doi]
- AQAT: The Architecture Quality Assurance Tool for Critical Embedded SystemsAndreas Johnsen, Kristina Lundqvist, Kaj Hänninen, Paul Pettersson. 260-270 [doi]
- Experience Report: Evaluating Fault Detection Effectiveness and Resource Efficiency of the Architecture Quality Assurance Framework and ToolAndreas Johnsen, Kristina Lundqvist, Kaj Hänninen, Paul Pettersson, Martin Torelm. 271-281 [doi]
- Experience Report: Log-Based Behavioral DifferencingMaayan Goldstein, Danny Raz, Itai Segall. 282-293 [doi]
- Experience Report: Verifying MPI Java Programs Using Software Model CheckingMuhammad Sohaib Ayub, Waqas ur Rehman, Junaid Haroon Siddiqui. 294-304 [doi]
- On FSM-Based Testing: An Empirical Study: Complete Round-Trip Versus Transition TreesHoda Khalil, Yvan Labiche. 305-315 [doi]
- COCOON: Crowdsourced Testing Quality Maximization Under Context Coverage ConstraintMiao Xie, Qing Wang, Guowei Yang, Mingshu Li. 316-327 [doi]
- Toward Rigorous Object-Code Coverage CriteriaTaejoon Byun, Vaibhav Sharma, Sanjai Rayadurgam, Stephen McCamant, Mats Per Erik Heimdahl. 328-338 [doi]
- Automatically Repairing Web Application Firewalls Based on Successful SQL Injection AttacksDennis Appelt, Annibale Panichella, Lionel C. Briand. 339-350 [doi]
- Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly DetectionChristophe Bertero, Matthieu Roy, Carla Sauvanaud, Gilles Trédan. 351-360 [doi]
- Learning Feature Representations from Change Dependency Graphs for Defect PredictionPablo Loyola, Yutaka Matsuo. 361-372 [doi]