Abstract is missing.
- Message from the Program Co-Chairs: ISSRE 2022Fabrizio Pastore, Lingming Zhang. [doi]
- Message from the General Co-Chairs: ISSRE 2022Katerina Goseva-Popstojanova, Bojan Cukic. [doi]
- TaintSQL: Dynamically Tracking Fine-Grained Implicit Flows for SQL StatementsWei Lin, Lu Zhang 0023, Haotian Zhang, Kailai Shao, Mingming Zhang, Tao Xie 0001. 1-12 [doi]
- Minimizing Link Generation in Constraint Checking for Context Inconsistency DetectionChuyang Chen, Huiyan Wang, Lingyu Zhang 0005, Chang Xu 0001, Ping Yu 0002. 13-24 [doi]
- Share or Not Share? Towards the Practicability of Deep Models for Unsupervised Anomaly Detection in Modern Online SystemsZilong He, Pengfei Chen, Tao Huang. 25-35 [doi]
- StellaUAV: A Tool for Testing the Safe Behavior of UAVs with Scenario-Based Testing (Tools and Artifact Track)Tabea Schmidt, Alexander Pretschner. 37-48 [doi]
- What to Check: Systematic Selection of Transformations for Analyzing Reliability of Machine Vision ComponentsBoyue Caroline Hu, Lina Marsso, Krzysztof Czarnecki 0001, Marsha Chechik. 49-60 [doi]
- Verifiable Obstacle DetectionAyoosh Bansal, Hunmin Kim, Simon Yu, Bo Li, Naira Hovakimyan, Marco Caccamo, Lui Sha. 61-72 [doi]
- START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report)Kevin Leach, Christopher Steven Timperley, Kevin Angstadt, Anh Nguyen-Tuong, Jason Hiser, Aaron Paulos, Partha P. Pal, Patrick Hurley, Carl Thomas, Jack W. Davidson, Stephanie Forrest, Claire Le Goues, Westley Weimer. 73-84 [doi]
- Braum: Analyzing and Protecting Autonomous Machine Software StackYiming Gan, Paul N. Whatmough, Jingwen Leng, Bo Yu, Shaoshan Liu, Yuhao Zhu 0001. 85-96 [doi]
- Bootstrapping confidence in future safety from past safe operationPeter Bishop 0001, Andrey Povyakalo, Lorenzo Strigini. 97-108 [doi]
- Graceful ECC-uncorrectable Error Handling in the Operating System KernelTakumi Iguchi, Hiroshi Yamada. 109-120 [doi]
- Going through the Life Cycle of Faults in Clouds: Guidelines on Fault HandlingXiaoyun Li, Guangba Yu, Pengfei Chen, Hongyang Chen, Zhekang Chen. 121-132 [doi]
- CEMENT: On the Use of Evolutionary Coupling Between Tests and Code Units. A Case Study on Fault LocalizationJeongju Sohn, Mike Papadakis. 133-144 [doi]
- Search-based Testing for Accurate Fault Localization in CPSEzio Bartocci, Leonardo Mariani, Dejan Nickovic, Drishti Yadav. 145-156 [doi]
- Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report)Julia Sorrentino, Priscila Silva, Gaspard Baye, Gökhan Kul, Lance Fiondella. 157-168 [doi]
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?Yue Liu, Chakkrit Tantithamthavorn, Li Li 0029, Yepang Liu 0001. 169-180 [doi]
- Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study: (Practical Experience Report)Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo. 181-192 [doi]
- Federated Learning for Tabular Data: Exploring Potential Risk to PrivacyHan Wu, Zilong Zhao 0001, Lydia Y. Chen, Aad van Moorsel. 193-204 [doi]
- Software Rejuvenation Meets Moving Target Defense: Modeling of Time-Based Virtual Machine Migration ApproachMatheus Torquato 0001, Paulo Romero Martins Maciel, Marco Vieira. 205-216 [doi]
- An Empirical Analysis of Compatibility Issues for Industrial Mobile Games (Practical Experience Report)Zihe Song, Yingfeng Chen, Lei Ma 0003, Shangjie Lu, Honglei Lin, Changjie Fan, Wei Yang. 217-228 [doi]
- REACH: Refining Alloy Scenarios by Size (Tools and Artifact Track)Ana Jovanovic, Allison Sullivan. 229-238 [doi]
- PUTraceAD: Trace Anomaly Detection with Partial Labels based on GNN and PU LearningKe Zhang, Chenxi Zhang, Xin Peng 0001, Chaofeng Sha. 239-250 [doi]
- String Test Data Generation for Java ProgramsMiaomiao Wang, Baoquan Cui, Jiwei Yan, Jun Yan, Jian Zhang. 251-262 [doi]
- A Novel Counterexample-Guided Inductive Synthesis Framework for Barrier Certificate GenerationMi Ding, Kaipeng Lin, Wang Lin, Zuohua Ding. 263-273 [doi]
- SlowCoach: Mutating Code to Simulate Performance BugsYiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, Neeraj Suri. 274-285 [doi]
- LLTFI: Framework Agnostic Fault Injection for Machine Learning Applications (Tools and Artifact Track)Udit Kumar Agarwal, Abraham Chan, Karthik Pattabiraman. 286-296 [doi]
- VECROsim: A Versatile Metric-oriented Microservice Fault Simulation System (Tools and Artifact Track)Tingzhu Bi, Yicheng Pan 0002, Xinrui Jiang, Meng Ma, Ping Wang. 297-308 [doi]
- Improving the Performance of Mutation-based Fault Localization via Mutant Bias Practical Experience ReportBin Du, Yuxiaoyang Cai, Haifeng Wang, Yong Liu, Xiang Chen 0005. 309-320 [doi]
- Effective Attribute Selection for Multi-dimensional Root Cause AnalysisYiran Cheng, Bo Cheng, Pengxiang Jin, Yongqian Sun, Xiaohui Nie, Nengwen Zhao, Shenglin Zhang, Dan Pei. 321-331 [doi]
- MC-FLoc: Learning from Traces to Locate Fault in Petri Net Model CheckingNing Ge 0002, Yuchen Liu. 332-343 [doi]
- A Naming Pattern Based Approach for Method Name RecommendationYanping Yang, Ling Xu, Meng Yan, Zhou Xu 0003, Zhongyang Deng. 344-354 [doi]
- A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP ProgramsHe Su, Lili Xu, Huina Chao, Feng Li, Zimu Yuan, Jianhua Zhou, Wei Huo. 355-365 [doi]
- Identifying Erroneous Software Changes through Self-Supervised Contrastive Learning on Time Series DataXuanrun Wang, Kanglin Yin, Qianyu Ouyang, Xidao Wen, Shenglin Zhang, Wenchi Zhang, Li Cao, Jiuxue Han, Xing Jin, Dan Pei. 366-377 [doi]
- Resilient Mechanism Against Byzantine Failure for Distributed Deep Reinforcement LearningMingyue Zhang, Zhi Jin, Jian Hou 0002, Renwei Luo. 378-389 [doi]
- Adversarial Input Detection Based on Critical Transformation RobustnessJing Su, Zhen Zhang, Peng Wu 0002, Xuran Li, Jian Zhang. 390-401 [doi]
- Towards the Robustness of Multiple Object Tracking SystemsXiaoyuan Xie, Ying Duan, Songqiang Chen, Jifeng Xuan. 402-413 [doi]
- Unifying Evaluation of Machine Learning Safety MonitorsJoris Guérin, Raul Sena Ferreira, Kevin Delmas, Jérémie Guiochet. 414-422 [doi]
- Taxonomy of Aging-related Bugs in Deep Learning LibrariesZhihao Liu, Yang Zheng, Xiaoting Du, Zheng Hu, Wenjie Ding, Yanming Miao, Zheng Zheng 0001. 423-434 [doi]
- The Impact of Software Aging and Rejuvenation on the User Experience for Android SystemKai Jia, Xiao Yu, Chen Zhang, Wenhua Hu, Dongdong Zhao 0001, Jianwen Xiang. 435-445 [doi]
- Enhancing Traceability Link Recovery with Unlabeled DataJianfei Zhu, Guanping Xiao, Zheng Zheng 0001, Yulei Sui. 446-457 [doi]
- Detecting and Refactoring Feature Envy Based on Graph Neural NetworkDongjin Yu, Yihang Xu, Lehui Weng, Jie Chen 0060, Xin Chen 0032, Quanxin Yang. 458-469 [doi]
- AexPy: Detecting API Breaking Changes in Python PackagesXingliang Du, Jun Ma. 470-481 [doi]
- DALT: Deep Activity Launching Test via Intent-Constraint ExtractionAo Liu, Chenkai Guo, Naipeng Dong, Yinjie Wang, Jing Xu. 482-493 [doi]
- Learning to Prune Infeasible Paths in Generalized Symbolic ExecutionFacundo Molina, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias. 494-504 [doi]
- Feedback-Driven Incremental Symbolic ExecutionQiuping Yi, Guowei Yang 0001. 505-516 [doi]
- Why Did the Test Execution Fail? Failure Classification Using Association Rules (Practical Experience Report)Claudius Jordan, Philipp Foth, Matthias Fruth, Alexander Pretschner. 517-528 [doi]
- Remgen: Remanufacturing a Random Program Generator for Compiler TestingHaoxin Tu, He Jiang 0001, Xiaochen Li, Zhilei Ren, Zhide Zhou, Lingxiao Jiang. 529-540 [doi]
- Multi-Objective Metamorphic Test Case Selection: an Industrial Case Study (Practical Experience Report)Jon Ayerdi, Aitor Arrieta, Ernest Bota Pobee, Maite Arratibel. 541-552 [doi]