Abstract is missing.
- Testing and Debugging Autonomous Driving: Experiences with Path Planner and Future ChallengesFuyuki Ishikawa. [doi]
- How do Ordinary Coding Errors Contribute to Security Vulnerabilities?D. Richard Kuhn. [doi]
- Fuzzing C++ class interfaces for generating and running tests with libFuzzerZoltán Porkoláb. [doi]
- ISSRE 2020 Doctoral Symposium Keynote : How to Get Your Paper RejectedJeff Offutt. [doi]
- K-Detector: Identifying Duplicate Crash Failures in Large-Scale Software DeliveryHao Yang, Yang Xu, Yong Li, Hyun-Deok Choi. 1-6 [doi]
- SAR Handbook Chapter: Experimental Tools for Software Aging AnalysisRoberto Natella, Artur Andrzejak 0001. 1 [doi]
- BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructuresJoão Lima, Filipe Apolinario, Nelson Escravana, Carlos Ribeiro. 7-12 [doi]
- ADF2T: an Active Disk Failure Forecasting and Tolerance SoftwareHongzhang Yang, Yahui Yang, Zhengguang Chen, Zongzhao Li, Yaofeng Tu. 13-18 [doi]
- When Failure is (Not) an Option: Reliability Models for Microservices ArchitecturesLalita Jategaonkar Jagadeesan, Veena B. Mendiratta. 19-24 [doi]
- CRESCO Framework and Checker: Automatic generation of Reflective UML State Machine's C++ Code and CheckerMiren Illarramendi Rezabal, Leire Etxeberria, Felix Larrinaga, Goiuria Sagardui. 25-30 [doi]
- Applying Modular Decomposition in SimulinkMonika Jaskolka, Stephen Scott, Vera Pantelic, Alan Wassyng, Mark Lawford. 31-36 [doi]
- Multi-label Classification of Commit Messages using Transfer LearningMuhammad Usman Sarwar, Sarim Zafar, Mohamed Wiem Mkaouer, Gursimran Singh Walia, Muhammad Zubair Malik. 37-42 [doi]
- Using Semantic Analysis and Graph Mining Approaches to Support Software Fault FixationManinder Singh, Gursimran S. Walia. 43-48 [doi]
- A Human Error Based Approach to Understanding Programmer-Induced Software VulnerabilitiesVaibhav K. Anu, Kazi Zakia Sultana, Bharath K. Samanthula. 49-54 [doi]
- Independent Verification and Validation for the Space Industry: Guide Evolution ExperienceNuno Silva, Xavier Ferreira, Jesper T. Troelsen, Tomasz Kacmajor. 55-60 [doi]
- A Process to Support Safety Analysis for a System-of-SystemsStephan Baumgart, Joakim Fröberg, Sasikumar Punnekkat. 61-66 [doi]
- Time-Series-Based Clustering for Failure Analysis in Hardware-in-the-Loop Setups: An Automotive Case StudyClaudius V. Jordan, Florian Hauer, Philipp Foth, Alexander Pretschner. 67-72 [doi]
- Instrumenting Compiler Pipeline to Synthesise Traceable Runtime Memory Layouts in Mixed-critical ApplicationsNermin Kajtazovic, Peter Hödl, Georg Macher. 73-78 [doi]
- Static and Verifiable Memory Partitioning for Safety-Critical SystemsJean Guyomarc'h, Jean-Baptiste Hervé. 79-84 [doi]
- Systematic Software Testing of Critical Embedded Digital Devices in Nuclear Power ApplicationsAthira Varma Jayakumar, Smitha Gautham, D. Richard Kuhn, Brandon J. Simon, Aidan G. Collins, Thomas Dirsch, Raghu Kacker, Carl R. Elks. 85-90 [doi]
- RSX: Reproduction Scenario Extraction Technique for Business Application Workloads in DBMSSeunghwan Baek, Jisoo Song, Changyun Seo. 91-96 [doi]
- ConstBin: A Tool for Automatic Fixing of Unreproducible BuildsHongjun He, Jicheng Cao, Lesheng Du, Hao Li, Shilong Wang, Shengyu Cheng. 97-102 [doi]
- An improved fuzzing approach based on adaptive random testingJinfu Chen, Jingyi Chen, Dong Guo, Dave Towey. 103-108 [doi]
- Migrating Large Deep Learning Models to Serverless ArchitectureDheeraj Chahal, Ravi Ojha, Manju Ramesh, Rekha Singhal. 111-116 [doi]
- eAPT: enhancing APT with a mirror site resolverGilhee Lee, Taegeun Moon, Min Jang, Hyoungshick Kim. 117-122 [doi]
- Techniques and Tools for Advanced Software Vulnerability DetectionJosé D'Abruzzo Pereira. 123-126 [doi]
- Reliability Evaluation of ML systems, the oracle problemAntonio Guerriero. 127-130 [doi]
- Improving the Security of Microservice Systems by Detecting and Tolerating IntrusionsJosé Flora. 131-134 [doi]
- Towards safety monitoring of ML-based perception tasks of autonomous systemsRaul S. Ferreira. 135-138 [doi]
- A Fault Localization and Debugging Support Framework driven by Bug Tracking DataThomas Hirsch. 139-142 [doi]
- Engineering Resilience: Predicting The Change Impact on Performance and Availability of Reconfigurable SystemsAlireza Hakamian. 143-146 [doi]
- Using Metamorphic Testing to Evaluate DNN Coverage CriteriaJinyi Zhou, Kun Qiu, Zheng Zheng 0001, Tsong Yueh Chen, Pak-Lok Poon. 147-148 [doi]
- SIDE: Security-aware Integrated Development EnvironmentNaghmeh Ivaki, Nuno Antunes. 149-150 [doi]
- Applying Machine Learning with Chaos EngineeringJuan Hernández-Serrato, Alejandro Velasco, Yury Nifio, Mario Linares Vásquez. 151-152 [doi]
- Multi-Language Web Vulnerability DetectionAlexandra Figueiredo, Tatjana Lide, Miguel Correia 0001. 153-154 [doi]
- Challenges Faced with Application Performance Monitoring (APM) when Migrating to the CloudVidroha Debroy, Alireza Mansoori, James Haleblian, Mark Wilkens. 153-154 [doi]
- Modelling CI/CD Pipeline Through Agent-Based SimulationQianying Liao. 155-156 [doi]
- Automated Tool for Revising Masking MC/DC Test SuiteZhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa. 157-158 [doi]
- Test-First for Abstracted Behavior of Software Using Extended Finite State MachineTomohiko Takagi, Koichiro Sakata. 159-160 [doi]
- Model-based Quantitative Fault Tree Analysis based on FIDES Reliability PredictionNataliya Yakymets, Morayo Adedjouma. 161-162 [doi]
- Unit Lemmas for Detecting Requirement and Specification FlawsAshlie B. Hocking, Jonathan C. Rowanhill, Ben L. Di Vito. 163-164 [doi]
- TDABD: Test-Driven-Assurance-Based DevelopmentJonathan C. Rowanhill, Ashlie B. Hocking, William H. Hawkins. 165-166 [doi]
- Should we "safely" handle the uncertainties at runtime? - A rather seldom asked questionNishanth Laxman, Peter Liggesmeyer. 167-168 [doi]
- Similarity Calculation of Executable Using Intel Pin Instrumentation FrameworkMadhuparna Bhowmik, Nara Madhumitha, Biju R. Mohan. 169-170 [doi]
- Root cause prediction based on bug reportsThomas Hirsch, Birgit Hofer. 171-176 [doi]
- Multi-Level Execution Trace Based Lock Contention AnalysisMajid Rezazadeh, Naser Ezzati Jivan, Evan Galea, Michel R. Dagenais. 177-182 [doi]
- AHPCap: A Framework for Automated Hardware Profiling and Capture of Mobile Application StatesRodger William Byrd, Taniza Sultana, Kristen R. Walcott. 183-188 [doi]
- Domain Metric Driven Decomposition of Data-Intensive ApplicationsMatteo Camilli, Carmine Colarusso, Barbara Russo, Eugenio Zimeo. 189-196 [doi]
- Towards the synthesis of context-aware choreographiesGianluca Filippone, Marco Autili, Massimo Tivoli. 197-200 [doi]
- Towards Anomaly Detectors that Learn ContinuouslyAndrea Stocco 0001, Paolo Tonella. 201-208 [doi]
- Standing on the Shoulders of Software Product Line Research for Testing Systems of SystemsAntonia Bertolino, Francesca Lonetti, Vânia de Oliveira Neves. 209-214 [doi]
- Declarative Dashboard GenerationAlessandro Tundo, Chiara Castelnovo, Marco Mobilio, Oliviero Riganelli, Leonardo Mariani. 215-218 [doi]
- A Reconfiguration Approach for Open Adaptive Systems-of-SystemsBjörn Wudka, Carsten Thomas, Lennart Siefke, Volker Sommer. 219-222 [doi]
- Towards Declarative Decentralised Application Management in the FogAntonio Brogi, Stefano Forti 0002, Carlos Guerrero, Isaac Lera. 223-230 [doi]
- Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on XenCharles F. Gonçalves, Nuno Antunes. 231-236 [doi]
- Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing AttacksDavid Pereira, João F. Ferreira, Alexandra Mendes. 237-242 [doi]
- EARNEST: A challenge-based intrusion prevention system for CAN messagesGianpiero Costantino, Ilaria Matteucci, Domenico Morales. 243-248 [doi]
- Considering Reliability of Deep Learning Function to Boost Data Suitability and Anomaly DetectionLydia Gauerhof, Yuki Hagiwara, Christoph Schorn, Mario Trapp. 249-254 [doi]
- Evaluating Deep Learning Classification Reliability in Android Malware Family DetectionGiacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 255-260 [doi]
- A flexible simulation-based framework for model-based/data-driven dependability evaluationCarlo Abate, Lelio Campanile, Stefano Marrone 0001. 261-266 [doi]
- Resilience, Survivability, and Elasticity: A Taxonomy for Change Impact Quantification of Reconfigurable SystemsAlireza Hakamian, Floriment Klinaku, André van Hoorn, Steffen Becker 0001. 267-274 [doi]
- Ensuring Dataset Quality for Machine Learning CertificationSylvaine Picard, Camille Chapdelaine, Cyril Cappi, Laurent Gardes, Eric Jenn, Baptiste Lefèvre, Thomas Soumarmon. 275-282 [doi]
- New Wine in an Old Bottle: N-Version Programming for Machine Learning ComponentsArpan Gujarati, Sathish Gopalakrishnan, Karthik Pattabiraman. 283-286 [doi]
- Towards Automated Evidence Generation for Rapid and Continuous Software CertificationJoanna C. S. Santos, Ali Shokri 0003, Mehdi Mirakhorli. 287-294 [doi]
- Checkable Safety Cases: Enabling Automated Consistency Checks between Safety Work ProductsCarmen Cârlan, Daniel Petrisor, Barbara Gallina, Hannes Schoenhaar. 295-302 [doi]
- Safety-Critical Software - Quantification of Test ResultsJohan Sundell, Kristina Lundqvist, Håkan Forsberg. 303-310 [doi]
- Generating test cases to evaluate and improve processes of safety-critical systems developmentLilian Barros, Celso Hirata, Johnny Marques, Ana Maria Ambrosio. 311-318 [doi]
- Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended AbstractAlberto Avritzer, Domenico Cotroneo, Yennun Huang, Kishor S. Trivedi. 319-320 [doi]
- Chapter 3: Software Rejuvenation: Key Concepts and GranularityVasilis P. Koutras, Agapios N. Platis. 321-322 [doi]
- SAR Handbook Chapter: Measurements-based aging analysisJavier Alonso, Kalyan Vaidyanathan, Roberto Pietrantuono. 323-324 [doi]
- Markov chains and Petri nets for software rejuvenation systemsFumio Machida, Paulo R. M. Maciel. 325-326 [doi]
- Chapter 8: Software Aging Monitoring and Rejuvenation for the Assessment of High Availability Systems - Extended AbstractAlberto Avritzer, Michael Grottke, Daniel Sadoc Menasché. 327 [doi]
- Detecting Struct Member-Related Memory Leaks Using Error Code Analysis in Linux KernelKeita Suzuki, Takafumi Kubota, Kenji Kono. 329-335 [doi]
- How Robust is the Optimal Software Rejuvenation Timing?Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi. 336-341 [doi]
- Software Aging in Image Classification Systems on Cloud and EdgeErmeson C. Andrade, Fumio Machida, Roberto Pietrantuono, Domenico Cotroneo. 342-348 [doi]